CVE-2020-28896

Source
https://cve.org/CVERecord?id=CVE-2020-28896
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-28896.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-28896
Downstream
Related
Published
2020-11-23T19:15:11.413Z
Modified
2026-05-15T12:04:14.033303670Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $sslforcetls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.

Database specific
{
    "unresolved_ranges": [
        {
            "vendor_product": "debian:debian_linux",
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "9.0"
                }
            ]
        },
        {
            "vendor_product": "neomutt:neomutt",
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:a:neomutt:neomutt:*:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "fixed": "2020-11-20"
                },
                {
                    "fixed": "2020-11-20"
                }
            ]
        }
    ]
}
References

Affected packages