USN-1221-1: Mutt vulnerability
29 September 2011
An attacker could trick mutt into trusting a rogue server.
Releases
Packages
- mutt - text-based mailreader supporting MIME, GPG, PGP and threading
Details
It was discovered that mutt incorrectly verified the hostname in an SSL
certificate. An attacker could trick mutt into trusting a rogue SMTPS,
IMAPS, or POP3S server's certificate, which was signed by a trusted certificate
authority, to perform a machine-in-the-middle attack.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 11.04
Ubuntu 10.10
Ubuntu 10.04
After a standard system update you need to restart mutt to make
all the necessary changes. Users are encouraged to verify their
~/.mutt_certificates file to ensure only trusted certificates are listed.