CVE-2009-1390

Mutt 1.5.19, when linked against (1) OpenSSL (mutt_ssl.c) or (2) GnuTLS (mutt_ssl_gnutls.c), allows connections when only one TLS certificate in the chain is accepted instead of verifying the entire chain, which allows remote attackers to spoof trusted servers via a man-in-the-middle attack.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 54%
VendorProductVersion
muttmutt
1.5.19
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
mutt
bullseye (security)
2.0.5-4.1+deb11u3
fixed
bullseye
2.0.5-4.1+deb11u3
fixed
lenny
not-affected
etch
not-affected
squeeze
not-affected
bookworm
2.2.12-0.1~deb12u1
fixed
bookworm (security)
2.2.9-1+deb12u1
fixed
sid
2.2.13-1
fixed
trixie
2.2.13-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
mutt
jaunty
not-affected
intrepid
not-affected
hardy
not-affected
dapper
not-affected