CVE-2020-14954
Summary
| CVE | CVE-2020-14954 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-06-21 17:15:00 UTC |
| Updated | 2023-11-07 03:17:00 UTC |
| Description | Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection." |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [SECURITY] Fedora 31 Update: mutt-1.14.5-1.fc31 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| [SECURITY] Fedora 31 Update: mutt-1.14.5-1.fc31 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| [SECURITY] Fedora 32 Update: mutt-1.14.5-1.fc32 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| Debian -- Security Information -- DSA-4708-1 neomutt |
DEBIAN |
www.debian.org |
Third Party Advisory |
| Debian -- Security Information -- DSA-4707-1 mutt |
DEBIAN |
www.debian.org |
Third Party Advisory |
| Mutt, Neomutt: Multiple vulnerabilities (GLSA 202007-57) — Gentoo security |
GENTOO |
security.gentoo.org |
|
| [SECURITY] Fedora 32 Update: mutt-1.14.5-1.fc32 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| [SECURITY] [DLA 2268-2] mutt regression update |
MLIST |
lists.debian.org |
|
| [SECURITY] [DLA 2268-1] mutt security update |
MLIST |
lists.debian.org |
|
| mutt 1.14.4 released |
MISC |
lists.mutt.org |
Mailing List, Vendor Advisory |
| Response Injection via STARTTLS in SMTP, POP3 and IMAP (#248) · Issues · Mutt Project / mutt · GitLab |
MISC |
gitlab.com |
Third Party Advisory |
| Release NeoMutt 2020-06-19 · neomutt/neomutt · GitHub |
MISC |
github.com |
Release Notes, Third Party Advisory |
| USN-4403-1: Mutt vulnerability and regression | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
|
| tls: clear data after a starttls acknowledgement · neomutt/neomutt@fb013ec · GitHub |
MISC |
github.com |
Patch, Third Party Advisory |
| The Mutt E-Mail Client |
MISC |
www.mutt.org |
Vendor Advisory |
| [security-announce] openSUSE-SU-2020:0915-1: important: Security update |
SUSE |
lists.opensuse.org |
|
| Fix STARTTLS response injection attack. (c547433c) · Commits · Mutt Project / mutt · GitLab |
MISC |
gitlab.com |
Patch, Third Party Advisory |
| [security-announce] openSUSE-SU-2020:0903-1: important: Security update |
SUSE |
lists.opensuse.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 296071 Oracle Solaris 11.4 Support Repository Update (SRU) 27.82.1 Missing (CPUOCT2020)
- 354118 Amazon Linux Security Advisory for mutt : ALAS2-2022-1892
- 750531 OpenSUSE Security Update for neomutt (openSUSE-SU-2020:2127-1)