Page 5 of 39 results (0.018 seconds)

CVSS: 9.8EPSS: 1%CPEs: 18EXPL: 0

An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a '/' character. Se ha descubierto un problema en Mutt en versiones anteriores a la 1.10.1 y NeoMutt en versiones anteriores al 2018-07-16. pop.c no prohíbe los caracteres que podrían interactuar de forma insegura con los nombres de ruta message-cache, tal y como queda demostrado con un carácter "/". • http://www.mutt.org/news.html https://access.redhat.com/errata/RHSA-2018:2526 https://github.com/neomutt/neomutt/commit/9bfab35522301794483f8f9ed60820bdec9be59e https://gitlab.com/muttmua/mutt/commit/6aed28b40a0410ec47d40c8c7296d8d10bae7576 https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html https://neomutt.org/2018/07/16/release https://security.gentoo.org/glsa/201810-07 https://usn.ubuntu.com/3719-3 https://www.debian.org/security/2018/dsa-4277 https://access.redhat.com • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 3%CPEs: 26EXPL: 0

Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion. Desbordamiento de buffer en copy.c en Mutt anterior a 1.5.23 permite a atacantes remotos causar una denegación de servicio (caída) a través de una línea de cabecera RFC2047 manipulada, relacionado con la expansión de dirección. • http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00001.html http://lists.opensuse.org/opensuse-updates/2014-03/msg00083.html http://lists.opensuse.org/opensuse-updates/2014-03/msg00085.html http://rhn.redhat.com/errata/RHSA-2014-0304.html http://www.debian.org/security/2014/dsa-2874 http://www.mutt.org/doc/devel/ChangeLog http://www.securityfocus.com/bid/66165 http://www.securitytracker.com/id/1029919 http://www.ubuntu.com/usn/USN-2147-1 https://access&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0

mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenSSL is used, does not verify the domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. En el archivo mutt_ssl.c en mutt versión 1.5.16 y otras versiones anteriores a 1.5.19, cuando es usado OpenSSL, no comprueba el nombre de dominio en el campo Common Name (CN) de un certificado X.509, que permite a los atacantes de tipo man-in-the-middle falsificar servidores SSL por medio de un certificado válido arbitrario. • http://dev.mutt.org/trac/ticket/3087 http://marc.info/?l=oss-security&m=125198917018936&w=2 http://www.openwall.com/lists/oss-security/2009/10/26/1 • CWE-310: Cryptographic Issues •

CVSS: 6.8EPSS: 0%CPEs: 3EXPL: 0

mutt_ssl.c in mutt 1.5.19 and 1.5.20, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. mutt_ssl.c en mutt 1.5.19 y 1.5.20, cuando usa OenSSL, no maneja de forma adecuada el caracter '\0' en un nombre de dominio, dentro del campo sujeto del Common Name (CN) en los certificados X.509, lo que permite a atacantes man-in-the-middle, espíar servidores SSL de su elección a través de certificados manipulados concedidos por Autoridades Certificadoras, esta relacionado con CVE-2009-2408. • http://dev.mutt.org/trac/changeset/6016:dc09812e63a3/mutt_ssl.c http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html http://marc.info/?l=oss-security&m=125198917018936&w=2 http://marc.info/?l=oss-security&m=125369675820512&w=2 • CWE-310: Cryptographic Issues •

CVSS: 6.8EPSS: 0%CPEs: 3EXPL: 2

Mutt 1.5.19, when linked against (1) OpenSSL (mutt_ssl.c) or (2) GnuTLS (mutt_ssl_gnutls.c), allows connections when only one TLS certificate in the chain is accepted instead of verifying the entire chain, which allows remote attackers to spoof trusted servers via a man-in-the-middle attack. Mutt v1.5.º9, enlazado contra (1) OpenSSL (mutt_ssl.c) o (2) GnuTLS (mutt_ssl_gnutls.c), permite conexiones cuando se acepta un certificado TLS en la cadena en vez de verificar esta última, lo que permite a atacantes remotos suplantar servidores de confianda a través de un ataque hombre-en-medio(Man-in-the-middle). • http://dev.mutt.org/hg/mutt/rev/64bf199c8d8a http://dev.mutt.org/hg/mutt/rev/8f11dd00c770 http://www.openwall.com/lists/oss-security/2009/06/10/2 http://www.securityfocus.com/bid/35288 https://exchange.xforce.ibmcloud.com/vulnerabilities/51068 https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00715.html • CWE-287: Improper Authentication •