CVE-2024-49393

NameCVE-2024-49393
DescriptionIn neomutt and mutt, the To and Cc email headers are not validated by cryptographic signing which allows an attacker that intercepts a message to change their value and include himself as a one of the recipients to compromise message confidentiality.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mutt (PTS)bullseye (security), bullseye2.0.5-4.1+deb11u3vulnerable
bookworm2.2.12-0.1~deb12u1vulnerable
bookworm (security)2.2.9-1+deb12u1vulnerable
sid, trixie2.2.13-1vulnerable
neomutt (PTS)bullseye20201127+dfsg.1-1.2vulnerable
bookworm20220429+dfsg1-4.1vulnerable
trixie20241114+dfsg1-1fixed
sid20241212+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
muttsource(unstable)(unfixed)unimportant
neomuttsource(unstable)20241002+dfsg-1unimportant

Notes

https://bugzilla.redhat.com/show_bug.cgi?id=2325317
https://gitlab.com/muttmua/mutt/-/issues/490
Mutt project does not plan to address CVE-2024-49393, CVE-2024-49394, CVE-2024-49395
cf. https://gitlab.com/muttmua/mutt/-/issues/490#note_2209448655 . Issues with documented
through http://mutt.org/doc/manual/#crypt-protected-headers-read
https://github.com/neomutt/neomutt/issues/4223
Protected since: https://github.com/neomutt/neomutt/commit/913a991a5a8a000c0acc761dd8c9b76eefabfbea (20241002)
Reading protected value since: https://github.com/neomutt/neomutt/commit/06f8ff5a97ecc4763d52f75b9aedf80578fe1404 (20241002)
Protected headers introduced in mutt 1.12

Search for package or bug name: Reporting problems