CVE-2020-14954

NameCVE-2020-14954
DescriptionMutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2268-1, DLA-2268-2, DSA-4707-1, DSA-4708-1
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mutt (PTS)stretch (security), stretch1.7.2-1+deb9u3fixed
buster1.10.1-2.1+deb10u3fixed
buster (security)1.10.1-2.1+deb10u2fixed
bullseye, sid1.14.6-1fixed
neomutt (PTS)buster, buster (security)20180716+dfsg.1-1+deb10u1fixed
bullseye, sid20200626+dfsg.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
muttsourcejessie1.5.23-3+deb8u3DLA-2268-2
muttsourcestretch1.7.2-1+deb9u3DSA-4707-1
muttsourcebuster1.10.1-2.1+deb10u2DSA-4707-1
muttsource(unstable)1.14.4-1
neomuttsourcebuster20180716+dfsg.1-1+deb10u1DSA-4708-1
neomuttsource(unstable)20200619+dfsg.1-1

Notes

https://gitlab.com/muttmua/mutt/commit/c547433cdf2e79191b15c6932c57f1472bfb5ff4
https://gitlab.com/muttmua/mutt/-/issues/248
https://github.com/neomutt/neomutt/commit/fb013ec666759cb8a9e294347c7b4c1f597639cc

Search for package or bug name: Reporting problems