Insufficiently Protected Credentials Affecting neomutt package, versions <20201120+dfsg.1-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.49% (77th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-NEOMUTT-1042980
  • published22 Nov 2020
  • disclosed23 Nov 2020

Introduced: 22 Nov 2020

CVE-2020-28896  (opens in a new tab)
CWE-522  (opens in a new tab)

How to fix?

Upgrade Debian:unstable neomutt to version 20201120+dfsg.1-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream neomutt package and not the neomutt package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.

CVSS Scores

version 3.1