Mutt
Sign in to watchby Mutt
Source repositories
CVEs (30)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-43863 | Low | 0.24 | 3.7 | 0.00 | May 4, 2026 | mutt before 2.3.2 has an infinite loop in data_object_to_stream in crypt-gpgme.c. | |
| CVE-2026-43862 | Low | 0.24 | 3.7 | 0.00 | May 4, 2026 | In mutt before 2.3.2, the imap_auth_gss security level is mishandled. | |
| CVE-2026-43861 | Low | 0.24 | 3.7 | 0.00 | May 4, 2026 | mutt before 2.3.2 does not check for '\0' in url_pct_decode. | |
| CVE-2026-43860 | Low | 0.24 | 3.7 | 0.00 | May 4, 2026 | mutt before 2.3.2 sometimes truncates the hash_passwd by one byte for IMAP auth_cram MD5 digest. | |
| CVE-2026-43859 | Low | 0.24 | 3.7 | 0.00 | May 4, 2026 | mutt before 2.3.2 sometimes uses strfcpy instead of memcpy for the IMAP auth_cram MD5 digest. | |
| CVE-2026-43864 | Low | 0.16 | 2.5 | 0.00 | May 4, 2026 | mutt before 2.3.2 has a show_sig_summary NULL pointer dereference. | |
| CVE-2007-2683 | 0.03 | — | 0.00 | May 15, 2007 | Buffer overflow in Mutt 1.4.2 might allow local users to execute arbitrary code via "&" characters in the GECOS field, which triggers the overflow during alias expansion. | ||
| CVE-2006-3242 | 0.01 | — | 0.08 | Jun 27, 2006 | Stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt 1.4.2.1 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via long namespaces received from the IMAP server. | ||
| CVE-2005-2642 | 0.01 | — | 0.10 | Aug 23, 2005 | Buffer overflow in the mutt_decode_xbit function in Handler.c for Mutt 1.5.10 allows remote attackers to execute arbitrary code, possibly due to interactions with libiconv or gettext. | ||
| CVE-2023-4874 | 0.00 | — | 0.00 | Sep 9, 2023 | Null pointer dereference when viewing a specially crafted email in Mutt >1.5.2 <2.2.12 | ||
| CVE-2023-4875 | 0.00 | — | 0.00 | Sep 9, 2023 | Null pointer dereference when composing from a specially crafted draft message in Mutt >1.5.2 <2.2.12 | ||
| CVE-2022-1328 | 0.00 | — | 0.00 | Apr 14, 2022 | Buffer Overflow in uudecoder in Mutt affecting all versions starting from 0.94.13 before 2.2.3 allows read past end of input line | ||
| CVE-2005-2351 | 0.00 | — | 0.00 | Nov 1, 2019 | Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files. | ||
| CVE-2014-9116 | 0.00 | — | 0.04 | Dec 2, 2014 | The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function. | ||
| CVE-2014-0467 | 0.00 | — | 0.02 | Mar 14, 2014 | Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion. | ||
| CVE-2011-1429 | 0.00 | — | 0.00 | Mar 16, 2011 | Mutt does not verify that the smtps server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL SMTP server via an arbitrary certificate, a different vulnerability than CVE-2009-3766. | ||
| CVE-2009-3766 | 0.00 | — | 0.00 | Oct 23, 2009 | mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when OpenSSL is used, does not verify the domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. | ||
| CVE-2009-3765 | 0.00 | — | 0.01 | Oct 23, 2009 | mutt_ssl.c in mutt 1.5.19 and 1.5.20, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. | ||
| CVE-2009-1390 | 0.00 | — | 0.00 | Jun 16, 2009 | Mutt 1.5.19, when linked against (1) OpenSSL (mutt_ssl.c) or (2) GnuTLS (mutt_ssl_gnutls.c), allows connections when only one TLS certificate in the chain is accepted instead of verifying the entire chain, which allows remote attackers to spoof trusted servers via a man-in-the-middle attack. | ||
| CVE-2007-1268 | 0.00 | — | 0.01 | Mar 6, 2007 | Mutt 1.5.13 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents Mutt from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection. |