CVE-2020-14954

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."

References

http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20200615/000023.html

http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html

http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html

http://www.mutt.org/

https://github.com/neomutt/neomutt/commit/fb013ec666759cb8a9e294347c7b4c1f597639cc

https://github.com/neomutt/neomutt/releases/tag/20200619

https://gitlab.com/muttmua/mutt/-/commit/c547433cdf2e79191b15c6932c57f1472bfb5ff4

https://gitlab.com/muttmua/mutt/-/issues/248

https://lists.debian.org/debian-lts-announce/2020/06/msg00039.html

https://lists.debian.org/debian-lts-announce/2020/06/msg00040.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/EFMEILCBKMZRRZDMUGWLVN4PQQ4VTAZE/

https://lists.fedoraproject.org/archives/list/[email protected]/message/K3LXFVPTLK4PNHL6MPKJNJQJ25CH7GLQ/

https://security.gentoo.org/glsa/202007-57

https://usn.ubuntu.com/4403-1/

https://www.debian.org/security/2020/dsa-4707

https://www.debian.org/security/2020/dsa-4708

Details

Source: MITRE

Published: 2020-06-21

Updated: 2020-07-28

Type: CWE-74

Risk Information

CVSS v2

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3

Base Score: 5.9

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Impact Score: 3.6

Exploitability Score: 2.2

Severity: MEDIUM

Tenable Plugins

View all (17 total)

IDNameProductFamilySeverity
150520SUSE SLES11 Security Update : mutt (SUSE-SU-2020:14414-1)NessusSuSE Local Security Checks
medium
146703EulerOS 2.0 SP2 : mutt (EulerOS-SA-2021-1330)NessusHuawei Local Security Checks
medium
143462openSUSE Security Update : neomutt (openSUSE-2020-2127)NessusSuSE Local Security Checks
medium
142070EulerOS 2.0 SP5 : mutt (EulerOS-SA-2020-2258)NessusHuawei Local Security Checks
medium
140876EulerOS 2.0 SP3 : mutt (EulerOS-SA-2020-2109)NessusHuawei Local Security Checks
medium
139120GLSA-202007-57 : Mutt, Neomutt: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
138721openSUSE Security Update : mutt (openSUSE-2020-915)NessusSuSE Local Security Checks
medium
138713openSUSE Security Update : mutt (openSUSE-2020-903)NessusSuSE Local Security Checks
medium
138307SUSE SLES12 Security Update : mutt (SUSE-SU-2020:1794-1)NessusSuSE Local Security Checks
medium
138301SUSE SLED15 / SLES15 Security Update : mutt (SUSE-SU-2020:1771-1)NessusSuSE Local Security Checks
medium
138110Fedora 31 : 5:mutt (2020-31af2ac7fd)NessusFedora Local Security Checks
medium
138108Fedora 32 : 5:mutt (2020-1cb4c3697b)NessusFedora Local Security Checks
medium
137911Debian DLA-2268-2 : mutt regression updateNessusDebian Local Security Checks
medium
137825Ubuntu 16.04 LTS / 18.04 LTS / 19.10 / 20.04 : Mutt vulnerability and regression (USN-4403-1)NessusUbuntu Local Security Checks
medium
137789FreeBSD : Machine-in-the-middle response injection attack when using STARTTLS with IMAP, POP3, and SMTP (29b13a34-b1d2-11ea-a11c-4437e6ad11c4)NessusFreeBSD Local Security Checks
medium
137731Debian DSA-4708-1 : neomutt - security updateNessusDebian Local Security Checks
medium
137675Debian DSA-4707-1 : mutt - security updateNessusDebian Local Security Checks
medium