CVE Vulnerabilities

CVE-2020-28896

Improper Authentication

Published: Nov 23, 2020 | Modified: Nov 21, 2024
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
CVSS 2.x
2.6 LOW
AV:N/AC:H/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP servers initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
MuttMutt*2.0.2 (excluding)
NeomuttNeomutt*2020-11-20 (excluding)
Red Hat Enterprise Linux 8RedHatmutt-5:2.0.7-1.el8*
MuttUbuntubionic*
MuttUbuntuesm-infra/bionic*
MuttUbuntuesm-infra/focal*
MuttUbuntuesm-infra/xenial*
MuttUbuntufocal*
MuttUbuntugroovy*
MuttUbuntutrusty*
MuttUbuntuupstream*
MuttUbuntuxenial*
NeomuttUbuntubionic*
NeomuttUbuntuesm-apps/bionic*
NeomuttUbuntuesm-apps/focal*
NeomuttUbuntufocal*
NeomuttUbuntugroovy*
NeomuttUbuntutrusty*
NeomuttUbuntuupstream*

Potential Mitigations

References