CVE-2007-1268

Source
https://nvd.nist.gov/vuln/detail/CVE-2007-1268
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2007-1268.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2007-1268
Published
2007-03-06T20:19:00Z
Modified
2025-01-14T06:01:28.241472Z
Summary
[none]
Details

Mutt 1.5.13 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents Mutt from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.

References

Affected packages

Debian:11 / mutt

Package

Name
mutt
Purl
pkg:deb/debian/mutt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.0.5-4.1
2.0.5-4.1+deb11u1
2.0.5-4.1+deb11u2
2.0.5-4.1+deb11u3
2.1.3-1
2.1.4-1
2.2.3-1
2.2.3-2
2.2.4-1
2.2.6-1
2.2.7-1
2.2.9-1
2.2.12-0.1~deb12u1
2.2.12-0.1
2.2.13-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / mutt

Package

Name
mutt
Purl
pkg:deb/debian/mutt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.2.9-1
2.2.9-1+deb12u1
2.2.12-0.1~deb12u1
2.2.12-0.1
2.2.13-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / mutt

Package

Name
mutt
Purl
pkg:deb/debian/mutt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.2.9-1
2.2.12-0.1~deb12u1
2.2.12-0.1
2.2.13-1

Ecosystem specific

{
    "urgency": "unimportant"
}