Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2020:0915-1

Опубликовано: 29 июн. 2020
Источник: suse-cvrf

Описание

Security update for mutt

This update for mutt fixes the following issues:

  • CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was affecting IMAP, SMTP, and POP3 (bsc#1173197).
  • CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935).
  • CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was proceeding with a connection (bsc#1172906, bsc#1172935).

This update was imported from the SUSE:SLE-15:Update update project.

Список пакетов

openSUSE Leap 15.2
mutt-1.10.1-lp152.3.3.1
mutt-doc-1.10.1-lp152.3.3.1
mutt-lang-1.10.1-lp152.3.3.1

Описание

Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.


Затронутые продукты
openSUSE Leap 15.2:mutt-1.10.1-lp152.3.3.1
openSUSE Leap 15.2:mutt-doc-1.10.1-lp152.3.3.1
openSUSE Leap 15.2:mutt-lang-1.10.1-lp152.3.3.1

Ссылки

Описание

Mutt before 1.14.3 proceeds with a connection even if, in response to a GnuTLS certificate prompt, the user rejects an expired intermediate certificate.


Затронутые продукты
openSUSE Leap 15.2:mutt-1.10.1-lp152.3.3.1
openSUSE Leap 15.2:mutt-doc-1.10.1-lp152.3.3.1
openSUSE Leap 15.2:mutt-lang-1.10.1-lp152.3.3.1

Ссылки

Описание

Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."


Затронутые продукты
openSUSE Leap 15.2:mutt-1.10.1-lp152.3.3.1
openSUSE Leap 15.2:mutt-doc-1.10.1-lp152.3.3.1
openSUSE Leap 15.2:mutt-lang-1.10.1-lp152.3.3.1

Ссылки