CVE-2020-14154

Mutt before 1.14.3 proceeds with a connection even if, in response to a GnuTLS certificate prompt, the user rejects an expired intermediate certificate.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 05:02

Type Values Removed Values Added
References () http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20200608/000022.html - Mailing List, Vendor Advisory () http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20200608/000022.html - Mailing List, Vendor Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html - Broken Link () http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html - Broken Link () http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html - Broken Link
References () http://www.mutt.org - Product, Vendor Advisory () http://www.mutt.org - Product, Vendor Advisory
References () https://bugs.gentoo.org/728300 - Third Party Advisory () https://bugs.gentoo.org/728300 - Third Party Advisory
References () https://security.gentoo.org/glsa/202007-57 - Third Party Advisory () https://security.gentoo.org/glsa/202007-57 - Third Party Advisory
References () https://usn.ubuntu.com/4401-1/ - Third Party Advisory () https://usn.ubuntu.com/4401-1/ - Third Party Advisory

Information

Published : 2020-06-15 17:15

Updated : 2024-11-21 05:02


NVD link : CVE-2020-14154

Mitre link : CVE-2020-14154

CVE.ORG link : CVE-2020-14154


JSON object : View

Products Affected

canonical

  • ubuntu_linux

mutt

  • mutt