ALT-PU-2021-1100-1
Closed vulnerabilities
BDU:2020-03244
Уязвимость почтового клиента Mutt, связанная с неправильным подтверждением подлинности сертификата, позволяющая нарушителю выполнить атаку типа «человек посередине»
BDU:2021-02007
Уязвимость почтовых клиентов Mutt и NeoMutt, связанная с недостатками процедуры нейтрализации особых элементов в выходных данных, используемых входящим компонентом, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-02008
Уязвимость почтового клиента Mutt, связанная с недостаточной защитой данных, позволяющая нарушителю выполнить атаку типа «человек посередине»
BDU:2021-03739
Уязвимость почтового клиента mutt, связанная с недостаточной защитой регистрационных данных, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-03747
Уязвимость компонента rfc822.c почтового клиента Mutt, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-14093
Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.
- openSUSE-SU-2020:0903
- openSUSE-SU-2020:0903
- openSUSE-SU-2020:0915
- openSUSE-SU-2020:0915
- http://www.mutt.org
- http://www.mutt.org
- https://bugs.gentoo.org/728300
- https://bugs.gentoo.org/728300
- https://github.com/muttmua/mutt/commit/3e88866dc60b5fa6aaba6fd7c1710c12c1c3cd01
- https://github.com/muttmua/mutt/commit/3e88866dc60b5fa6aaba6fd7c1710c12c1c3cd01
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2268-1] mutt security update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2268-1] mutt security update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2268-2] mutt regression update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2268-2] mutt regression update
- GLSA-202007-57
- GLSA-202007-57
- USN-4401-1
- USN-4401-1
- DSA-4707
- DSA-4707
- DSA-4708
- DSA-4708
Modified: 2024-11-21
CVE-2020-14154
Mutt before 1.14.3 proceeds with a connection even if, in response to a GnuTLS certificate prompt, the user rejects an expired intermediate certificate.
- http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20200608/000022.html
- http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20200608/000022.html
- openSUSE-SU-2020:0903
- openSUSE-SU-2020:0903
- openSUSE-SU-2020:0915
- openSUSE-SU-2020:0915
- http://www.mutt.org
- http://www.mutt.org
- https://bugs.gentoo.org/728300
- https://bugs.gentoo.org/728300
- GLSA-202007-57
- GLSA-202007-57
- USN-4401-1
- USN-4401-1
Modified: 2024-11-21
CVE-2020-14954
Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
- http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20200615/000023.html
- http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20200615/000023.html
- openSUSE-SU-2020:0903
- openSUSE-SU-2020:0903
- openSUSE-SU-2020:0915
- openSUSE-SU-2020:0915
- http://www.mutt.org/
- http://www.mutt.org/
- https://github.com/neomutt/neomutt/commit/fb013ec666759cb8a9e294347c7b4c1f597639cc
- https://github.com/neomutt/neomutt/commit/fb013ec666759cb8a9e294347c7b4c1f597639cc
- https://github.com/neomutt/neomutt/releases/tag/20200619
- https://github.com/neomutt/neomutt/releases/tag/20200619
- https://gitlab.com/muttmua/mutt/-/commit/c547433cdf2e79191b15c6932c57f1472bfb5ff4
- https://gitlab.com/muttmua/mutt/-/commit/c547433cdf2e79191b15c6932c57f1472bfb5ff4
- https://gitlab.com/muttmua/mutt/-/issues/248
- https://gitlab.com/muttmua/mutt/-/issues/248
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2268-1] mutt security update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2268-1] mutt security update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2268-2] mutt regression update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2268-2] mutt regression update
- FEDORA-2020-31af2ac7fd
- FEDORA-2020-31af2ac7fd
- FEDORA-2020-1cb4c3697b
- FEDORA-2020-1cb4c3697b
- GLSA-202007-57
- GLSA-202007-57
- USN-4403-1
- USN-4403-1
- DSA-4707
- DSA-4707
- DSA-4708
- DSA-4708
Modified: 2024-11-21
CVE-2020-28896
Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.
- https://github.com/neomutt/neomutt/commit/9c36717a3e2af1f2c1b7242035455ec8112b4b06
- https://github.com/neomutt/neomutt/commit/9c36717a3e2af1f2c1b7242035455ec8112b4b06
- https://github.com/neomutt/neomutt/releases/tag/20201120
- https://github.com/neomutt/neomutt/releases/tag/20201120
- https://gitlab.com/muttmua/mutt/-/commit/04b06aaa3e0cc0022b9b01dbca2863756ebbf59a
- https://gitlab.com/muttmua/mutt/-/commit/04b06aaa3e0cc0022b9b01dbca2863756ebbf59a
- https://gitlab.com/muttmua/mutt/-/commit/d92689088dfe80a290ec836e292376e2d9984f8f
- https://gitlab.com/muttmua/mutt/-/commit/d92689088dfe80a290ec836e292376e2d9984f8f
- [debian-lts-announce] 20201130 [SECURITY] [DLA 2472-1] mutt security update
- [debian-lts-announce] 20201130 [SECURITY] [DLA 2472-1] mutt security update
- GLSA-202101-32
- GLSA-202101-32
Modified: 2024-11-21
CVE-2021-3181
rfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of service (mailbox unavailability) by sending email messages with sequences of semicolon characters in RFC822 address fields (aka terminators of empty groups). A small email message from the attacker can cause large memory consumption, and the victim may then be unable to see email messages from other persons.
- [oss-security] 20210119 Re: mutt recipient parsing memory leak
- [oss-security] 20210119 Re: mutt recipient parsing memory leak
- [oss-security] 20210127 glibc iconv crash with ISO-2022-JP-3
- [oss-security] 20210127 glibc iconv crash with ISO-2022-JP-3
- https://gitlab.com/muttmua/mutt/-/commit/4a2becbdb4422aaffe3ce314991b9d670b7adf17
- https://gitlab.com/muttmua/mutt/-/commit/4a2becbdb4422aaffe3ce314991b9d670b7adf17
- https://gitlab.com/muttmua/mutt/-/commit/939b02b33ae29bc0d642570c1dcfd4b339037d19
- https://gitlab.com/muttmua/mutt/-/commit/939b02b33ae29bc0d642570c1dcfd4b339037d19
- https://gitlab.com/muttmua/mutt/-/commit/d4305208955c5cdd9fe96dfa61e7c1e14e176a14
- https://gitlab.com/muttmua/mutt/-/commit/d4305208955c5cdd9fe96dfa61e7c1e14e176a14
- https://gitlab.com/muttmua/mutt/-/issues/323
- https://gitlab.com/muttmua/mutt/-/issues/323
- [debian-lts-announce] 20210120 [SECURITY] [DLA 2529-1] mutt security update
- [debian-lts-announce] 20210120 [SECURITY] [DLA 2529-1] mutt security update
- FEDORA-2021-4205e1fc23
- FEDORA-2021-4205e1fc23
- FEDORA-2021-a4f016c6c8
- FEDORA-2021-a4f016c6c8
- GLSA-202101-25
- GLSA-202101-25
- DSA-4838
- DSA-4838