CVE-2020-28896

NameCVE-2020-28896
DescriptionMutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2472-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mutt (PTS)bullseye (security), bullseye2.0.5-4.1+deb11u3fixed
bookworm2.2.12-0.1~deb12u1fixed
bookworm (security)2.2.9-1+deb12u1fixed
sid, trixie2.2.13-1fixed
neomutt (PTS)bullseye20201127+dfsg.1-1.2fixed
bookworm20220429+dfsg1-4.1fixed
sid, trixie20241114+dfsg1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
muttsourcestretch1.7.2-1+deb9u4DLA-2472-1
muttsourcebuster1.10.1-2.1+deb10u4
muttsource(unstable)2.0.2-1
neomuttsourcebuster20180716+dfsg.1-1+deb10u2
neomuttsource(unstable)20201120+dfsg.1-1

Notes

https://gitlab.com/muttmua/mutt/-/commit/04b06aaa3e0cc0022b9b01dbca2863756ebbf59a
https://github.com/neomutt/neomutt/commit/9c36717a3e2af1f2c1b7242035455ec8112b4b06

Search for package or bug name: Reporting problems