CVE-2020-28896

MEDIUM

Mutt < 2.0.2 - Improper Exception Handling

Title source: rule
STIX 2.1

Description

Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.

References (6)

Core 6
Core References
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/neomutt/neomutt/releases/tag/20201120
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/11/msg00048.html
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202101-32

Scores

CVSS v3 5.3
EPSS 0.0010
EPSS Percentile 26.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N

Details

CWE
CWE-755 CWE-287
Status published
Products (3)
debian/debian_linux 9.0
mutt/mutt < 2.0.2
neomutt/neomutt < 2020-11-20
Published Nov 23, 2020
Tracked Since Feb 18, 2026