Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-14954.json"
[
{
"deprecated": false,
"digest": {
"function_hash": "3924893623696282984031067475760628486",
"length": 2406.0
},
"signature_type": "Function",
"target": {
"file": "mutt_ssl.c",
"function": "mutt_ssl_starttls"
},
"source": "https://gitlab.com/muttmua/mutt@c547433cdf2e79191b15c6932c57f1472bfb5ff4",
"id": "CVE-2020-14954-57a58ee4",
"signature_version": "v1"
},
{
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"220009596432518087481277674940495787568",
"219524305078317464263044700899935190261",
"85529289398689296017134109923965014091",
"29496026359297498989424405448808859555"
]
},
"signature_type": "Line",
"target": {
"file": "mutt_socket.h"
},
"source": "https://gitlab.com/muttmua/mutt@c547433cdf2e79191b15c6932c57f1472bfb5ff4",
"id": "CVE-2020-14954-5e6ba7de",
"signature_version": "v1"
},
{
"deprecated": false,
"digest": {
"function_hash": "100829173116190600858159645461328931119",
"length": 289.0
},
"signature_type": "Function",
"target": {
"file": "mutt_ssl_gnutls.c",
"function": "mutt_ssl_starttls"
},
"source": "https://gitlab.com/muttmua/mutt@c547433cdf2e79191b15c6932c57f1472bfb5ff4",
"id": "CVE-2020-14954-6579b0b3",
"signature_version": "v1"
},
{
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"188497607745055877459878591124861724843",
"293150522518363429545752787994509039533",
"333420326018441820831316304765230543074"
]
},
"signature_type": "Line",
"target": {
"file": "mutt_ssl.c"
},
"source": "https://gitlab.com/muttmua/mutt@c547433cdf2e79191b15c6932c57f1472bfb5ff4",
"id": "CVE-2020-14954-72f169ff",
"signature_version": "v1"
},
{
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"195169622976178384685312765189902567523",
"144496850903660620582356269248905645793",
"118627108049108073556564599796214648056",
"242834342463301710076991533363548928466"
]
},
"signature_type": "Line",
"target": {
"file": "mutt_ssl_gnutls.c"
},
"source": "https://gitlab.com/muttmua/mutt@c547433cdf2e79191b15c6932c57f1472bfb5ff4",
"id": "CVE-2020-14954-7736d919",
"signature_version": "v1"
},
{
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"142098375908311935035689897214063071626",
"269862614409702674060039833485377731210",
"232483895511340113153063965403749246449"
]
},
"signature_type": "Line",
"target": {
"file": "mutt_socket.c"
},
"source": "https://gitlab.com/muttmua/mutt@c547433cdf2e79191b15c6932c57f1472bfb5ff4",
"id": "CVE-2020-14954-a960bb0e",
"signature_version": "v1"
}
]