Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2020-28896

Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 69.0%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 2.6
References
Products affected by CVE-2020-28896
  • Mutt » Mutt » Version: 1.10.1
    cpe:2.3:a:mutt:mutt:1.10.1
  • Mutt » Mutt » Version: 1.11.0
    cpe:2.3:a:mutt:mutt:1.11.0
  • Mutt » Mutt » Version: 1.11.1
    cpe:2.3:a:mutt:mutt:1.11.1
  • Mutt » Mutt » Version: 1.11.2
    cpe:2.3:a:mutt:mutt:1.11.2
  • Mutt » Mutt » Version: 1.11.3
    cpe:2.3:a:mutt:mutt:1.11.3
  • Mutt » Mutt » Version: 1.11.4
    cpe:2.3:a:mutt:mutt:1.11.4
  • Mutt » Mutt » Version: 1.12.0
    cpe:2.3:a:mutt:mutt:1.12.0
  • Mutt » Mutt » Version: 1.12.1
    cpe:2.3:a:mutt:mutt:1.12.1
  • Mutt » Mutt » Version: 1.12.2
    cpe:2.3:a:mutt:mutt:1.12.2
  • Mutt » Mutt » Version: 1.13.0
    cpe:2.3:a:mutt:mutt:1.13.0
  • Mutt » Mutt » Version: 1.13.1
    cpe:2.3:a:mutt:mutt:1.13.1
  • Mutt » Mutt » Version: 1.13.2
    cpe:2.3:a:mutt:mutt:1.13.2
  • Mutt » Mutt » Version: 1.13.3
    cpe:2.3:a:mutt:mutt:1.13.3
  • Mutt » Mutt » Version: 1.13.4
    cpe:2.3:a:mutt:mutt:1.13.4
  • Mutt » Mutt » Version: 1.13.5
    cpe:2.3:a:mutt:mutt:1.13.5
  • Mutt » Mutt » Version: 1.14.0
    cpe:2.3:a:mutt:mutt:1.14.0
  • Mutt » Mutt » Version: 1.14.1
    cpe:2.3:a:mutt:mutt:1.14.1
  • Mutt » Mutt » Version: 1.14.2
    cpe:2.3:a:mutt:mutt:1.14.2
  • Mutt » Mutt » Version: 1.14.3
    cpe:2.3:a:mutt:mutt:1.14.3
  • Mutt » Mutt » Version: 1.14.4
    cpe:2.3:a:mutt:mutt:1.14.4
  • Mutt » Mutt » Version: 1.14.5
    cpe:2.3:a:mutt:mutt:1.14.5
  • Mutt » Mutt » Version: 1.14.6
    cpe:2.3:a:mutt:mutt:1.14.6
  • Mutt » Mutt » Version: 1.14.7
    cpe:2.3:a:mutt:mutt:1.14.7
  • Mutt » Mutt » Version: 1.5
    cpe:2.3:a:mutt:mutt:1.5
  • Mutt » Mutt » Version: 1.5.1
    cpe:2.3:a:mutt:mutt:1.5.1
  • Mutt » Mutt » Version: 1.5.10
    cpe:2.3:a:mutt:mutt:1.5.10
  • Mutt » Mutt » Version: 1.5.11
    cpe:2.3:a:mutt:mutt:1.5.11
  • Mutt » Mutt » Version: 1.5.12
    cpe:2.3:a:mutt:mutt:1.5.12
  • Mutt » Mutt » Version: 1.5.13
    cpe:2.3:a:mutt:mutt:1.5.13
  • Mutt » Mutt » Version: 1.5.14
    cpe:2.3:a:mutt:mutt:1.5.14
  • Mutt » Mutt » Version: 1.5.15
    cpe:2.3:a:mutt:mutt:1.5.15
  • Mutt » Mutt » Version: 1.5.16
    cpe:2.3:a:mutt:mutt:1.5.16
  • Mutt » Mutt » Version: 1.5.17
    cpe:2.3:a:mutt:mutt:1.5.17
  • Mutt » Mutt » Version: 1.5.18
    cpe:2.3:a:mutt:mutt:1.5.18
  • Mutt » Mutt » Version: 1.5.19
    cpe:2.3:a:mutt:mutt:1.5.19
  • Mutt » Mutt » Version: 1.5.2
    cpe:2.3:a:mutt:mutt:1.5.2
  • Mutt » Mutt » Version: 1.5.20
    cpe:2.3:a:mutt:mutt:1.5.20
  • Mutt » Mutt » Version: 1.5.20-7
    cpe:2.3:a:mutt:mutt:1.5.20-7
  • Mutt » Mutt » Version: 1.5.21
    cpe:2.3:a:mutt:mutt:1.5.21
  • Mutt » Mutt » Version: 1.5.22
    cpe:2.3:a:mutt:mutt:1.5.22
  • Mutt » Mutt » Version: 1.5.3
    cpe:2.3:a:mutt:mutt:1.5.3
  • Mutt » Mutt » Version: 1.5.4
    cpe:2.3:a:mutt:mutt:1.5.4
  • Mutt » Mutt » Version: 1.5.5
    cpe:2.3:a:mutt:mutt:1.5.5
  • Mutt » Mutt » Version: 1.5.6
    cpe:2.3:a:mutt:mutt:1.5.6
  • Mutt » Mutt » Version: 1.5.7
    cpe:2.3:a:mutt:mutt:1.5.7
  • Mutt » Mutt » Version: 1.5.8
    cpe:2.3:a:mutt:mutt:1.5.8
  • Mutt » Mutt » Version: 1.5.9
    cpe:2.3:a:mutt:mutt:1.5.9
  • Mutt » Mutt » Version: 2.0.0
    cpe:2.3:a:mutt:mutt:2.0.0
  • Mutt » Mutt » Version: 2.0.1
    cpe:2.3:a:mutt:mutt:2.0.1
  • Neomutt » Neomutt » Version: 2019-10-25
    cpe:2.3:a:neomutt:neomutt:2019-10-25
  • Debian » Debian Linux » Version: 9.0
    cpe:2.3:o:debian:debian_linux:9.0


Contact Us

Shodan ® - All rights reserved