Description
mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenSSL is used, does not verify the domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
CVSS vector
AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4 Affected Packages3 packages
🔴Vulnerability Details
3GHSAGHSA-h64v-56v4-2q6j: Mutt does not verify that the smtps server hostname matches the domain name of the subject of an X↗2022-05-17 ▶ GHSAGHSA-92jw-w2rc-xwxg: mutt_ssl↗2022-05-02 ▶ OSVCVE-2011-1429: Mutt does not verify that the smtps server hostname matches the domain name of the subject of an X↗2011-03-16 ▶ 📋Vendor Advisories
4Red Hatmutt: SSL host name check may be skipped when verifying certificate chain↗2011-03-08 ▶ DebianCVE-2011-1429: mutt - Mutt does not verify that the smtps server hostname matches the domain name of t...↗2011 ▶ Red Hatmutt: missing host name vs. SSL certificate name checks↗2009-08-10 ▶ DebianCVE-2009-3766: mutt - mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenSSL is used...↗2009 ▶ 💬Community
3BugzillaCVE-2011-1429 mutt: SSL host name check may be skipped when verifying certificate chain↗2011-03-17 ▶ BugzillaCVE-2009-3766 mutt: missing host name vs. SSL certificate name checks↗2009-10-26 ▶ BugzillaCVE-2009-3765 mutt: Doesn't properly handle NULL character in subject Common Name↗2009-10-24 ▶