CVE-2020-28896

Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*
cpe:2.3:a:neomutt:neomutt:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

28 Jan 2021, 14:43

Type Values Removed Values Added
References (GENTOO) https://security.gentoo.org/glsa/202101-32 - (GENTOO) https://security.gentoo.org/glsa/202101-32 - Third Party Advisory

27 Jan 2021, 03:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202101-32 -

Information

Published : 2020-11-23 19:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-28896

Mitre link : CVE-2020-28896

CVE.ORG link : CVE-2020-28896


JSON object : View

Products Affected

neomutt

  • neomutt

mutt

  • mutt

debian

  • debian_linux
CWE
CWE-287

Improper Authentication

CWE-755

Improper Handling of Exceptional Conditions