CVE-2020-14954

NameCVE-2020-14954
DescriptionMutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2268-1, DLA-2268-2, DSA-4707-1, DSA-4708-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mutt (PTS)bullseye (security), bullseye2.0.5-4.1+deb11u3fixed
bookworm2.2.12-0.1~deb12u1fixed
bookworm (security)2.2.9-1+deb12u1fixed
sid, trixie2.2.13-1fixed
neomutt (PTS)bullseye20201127+dfsg.1-1.2fixed
bookworm20220429+dfsg1-4.1fixed
sid, trixie20241212+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
muttsourcejessie1.5.23-3+deb8u3DLA-2268-2
muttsourcestretch1.7.2-1+deb9u3DSA-4707-1
muttsourcebuster1.10.1-2.1+deb10u2DSA-4707-1
muttsource(unstable)1.14.4-1
neomuttsourcebuster20180716+dfsg.1-1+deb10u1DSA-4708-1
neomuttsource(unstable)20200619+dfsg.1-1

Notes

https://gitlab.com/muttmua/mutt/commit/c547433cdf2e79191b15c6932c57f1472bfb5ff4
https://gitlab.com/muttmua/mutt/-/issues/248
https://github.com/neomutt/neomutt/commit/fb013ec666759cb8a9e294347c7b4c1f597639cc

Search for package or bug name: Reporting problems