Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
History
No history.
Information
Published : 2020-06-21 17:15
Updated : 2023-11-07 03:17
NVD link : CVE-2020-14954
Mitre link : CVE-2020-14954
CVE.ORG link : CVE-2020-14954
JSON object : View
Products Affected
neomutt
- neomutt
canonical
- ubuntu_linux
fedoraproject
- fedora
mutt
- mutt
opensuse
- leap
debian
- debian_linux
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')