CVE-2020-14954
MEDIUMMutt <1.14.4-NeoMutt <2020-06-19 - Response Injection
Title source: llmDescription
Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
References (16)
Core 16
Core References
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2020/dsa-4707
Product x_refsource_misc
http://www.mutt.org/
Issue Tracking, Third Party Advisory x_refsource_misc
https://gitlab.com/muttmua/mutt/-/issues/248
Mailing List, Vendor Advisory x_refsource_misc
http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20200615/000023.html
Patch x_refsource_misc
https://gitlab.com/muttmua/mutt/-/commit/c547433cdf2e79191b15c6932c57f1472bfb5ff4
Release Notes x_refsource_misc
https://github.com/neomutt/neomutt/releases/tag/20200619
Patch x_refsource_misc
https://github.com/neomutt/neomutt/commit/fb013ec666759cb8a9e294347c7b4c1f597639cc
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2020/dsa-4708
Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html
Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/06/msg00039.html
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/06/msg00040.html
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3LXFVPTLK4PNHL6MPKJNJQJ25CH7GLQ/
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/4403-1/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EFMEILCBKMZRRZDMUGWLVN4PQQ4VTAZE/
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/202007-57
Scores
CVSS v3
5.9
EPSS
0.0578
EPSS Percentile
90.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Details
CWE
CWE-74
Status
published
Products (14)
canonical/ubuntu_linux
12.04
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
19.10
canonical/ubuntu_linux
20.04
debian/debian_linux
9.0
debian/debian_linux
10.0
debian/debian_linux
8.0
fedoraproject/fedora
31
fedoraproject/fedora
32
... and 4 more
Published
Jun 21, 2020
Tracked Since
Feb 18, 2026