CVE-2020-28896

Name
CVE-2020-28896
Description
Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://github.com/neomutt/neomutt/commit/9c36717a3e2af1f2c1b7242035455ec8112b4b06
Patch https://gitlab.com/muttmua/mutt/-/commit/d92689088dfe80a290ec836e292376e2d9984f8f
Release Notes https://github.com/neomutt/neomutt/releases/tag/20201120
Patch https://gitlab.com/muttmua/mutt/-/commit/04b06aaa3e0cc0022b9b01dbca2863756ebbf59a
Mailing List https://lists.debian.org/debian-lts-announce/2020/11/msg00048.html
Third Party Advisory https://security.gentoo.org/glsa/202101-32

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:* mutt >= None < 2.0.2
cpe:2.3:a:neomutt:neomutt:*:*:*:*:*:*:*:* neomutt >= None < 2020-11-20

Vulnerable and fixed packages

Source package Branch Version Maintainer Status