Mutt 1.5.19, when linked against (1) OpenSSL (mutt_ssl.c) or (2) GnuTLS (mutt_ssl_gnutls.c), allows connections when only one TLS certificate in the chain is accepted instead of verifying the entire chain, which allows remote attackers to spoof trusted servers via a man-in-the-middle attack.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://dev.mutt.org/hg/mutt/rev/64bf199c8d8a - Exploit, Patch | |
References | () http://dev.mutt.org/hg/mutt/rev/8f11dd00c770 - Exploit | |
References | () http://www.openwall.com/lists/oss-security/2009/06/10/2 - Patch | |
References | () http://www.securityfocus.com/bid/35288 - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/51068 - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00715.html - |
Information
Published : 2009-06-16 21:00
Updated : 2024-11-21 01:02
NVD link : CVE-2009-1390
Mitre link : CVE-2009-1390
CVE.ORG link : CVE-2009-1390
JSON object : View
Products Affected
mutt
- mutt
gnu
- gnutls
openssl
- openssl
CWE
CWE-287
Improper Authentication