Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.
References
Link | Resource |
---|---|
http://www.mutt.org | Vendor Advisory |
https://github.com/muttmua/mutt/commit/3e88866dc60b5fa6aaba6fd7c1710c12c1c3cd01 | Patch Third Party Advisory |
https://www.debian.org/security/2020/dsa-4707 | Third Party Advisory |
https://bugs.gentoo.org/728300 | Third Party Advisory |
https://www.debian.org/security/2020/dsa-4708 | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/06/msg00040.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/06/msg00039.html | Mailing List Third Party Advisory |
https://usn.ubuntu.com/4401-1/ | Third Party Advisory |
https://security.gentoo.org/glsa/202007-57 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2020-06-14 22:15
Updated : 2022-04-27 07:16
NVD link : CVE-2020-14093
Mitre link : CVE-2020-14093
JSON object : View
CWE
CWE-319
Cleartext Transmission of Sensitive Information
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
mutt
- mutt
opensuse
- leap