{"id":"USN-7204-1","summary":"neomutt vulnerabilities","details":"Jeriko One discovered that NeoMutt incorrectly handled certain IMAP\nand POP3 responses. An attacker could possibly use this issue to\ncause NeoMutt to crash, resulting in a denial of service, or\nthe execution of arbitrary code. This issue only affected\nUbuntu 18.04 LTS. (CVE-2018-14349, CVE-2018-14350, CVE-2018-14351,\nCVE-2018-14352, CVE-2018-14353, CVE-2018-14354, CVE-2018-14355,\nCVE-2018-14356, CVE-2018-14357, CVE-2018-14358, CVE-2018-14359,\nCVE-2018-14362)\n\nJeriko One discovered that NeoMutt incorrectly handled certain\nNNTP-related operations. An attacker could possibly use this issue\nto cause NeoMutt to crash, resulting in denial of service, or\nthe execution of arbitrary code. This issue only affected\nUbuntu 18.04 LTS. (CVE-2018-14360, CVE-2018-14361, CVE-2018-14363)\n\nIt was discovered that NeoMutt incorrectly processed additional data\nwhen communicating with mail servers. An attacker could possibly use\nthis issue to access senstive information. This issue only affected\nUbuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-14954, CVE-2020-28896)\n\nIt was discovered that Neomutt incorrectly handled the IMAP QRSync\nsetting. An attacker could possibly use this issue to cause NeoMutt\nto crash, resulting in denial of service. This issue only affected\nUbuntu 20.04 LTS. (CVE-2021-32055)\n\nTavis Ormandy discovered that NeoMutt incorrectly parsed uuencoded\ntext past the length of the string. An attacker could possibly use\nthis issue to enable the execution of arbitrary code. This issue\nonly affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and\nUbuntu 22.04 LTS. (CVE-2022-1328)\n\nIt was discovered that NeoMutt did not properly encrypt email headers.\nAn attacker could possibly use this issue to receive emails that were\nnot intended for them and access sensitive information. This\nvulnerability was only fixed in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS,\nand Ubuntu 24.04 LTS. (CVE-2024-49393, CVE-2024-49394)\n","modified":"2026-02-10T04:46:29Z","published":"2025-01-15T16:07:30Z","related":["UBUNTU-CVE-2018-14349","UBUNTU-CVE-2018-14350","UBUNTU-CVE-2018-14351","UBUNTU-CVE-2018-14352","UBUNTU-CVE-2018-14353","UBUNTU-CVE-2018-14354","UBUNTU-CVE-2018-14355","UBUNTU-CVE-2018-14356","UBUNTU-CVE-2018-14357","UBUNTU-CVE-2018-14358","UBUNTU-CVE-2018-14359","UBUNTU-CVE-2018-14360","UBUNTU-CVE-2018-14361","UBUNTU-CVE-2018-14362","UBUNTU-CVE-2018-14363","UBUNTU-CVE-2020-14954","UBUNTU-CVE-2020-28896","UBUNTU-CVE-2021-32055","UBUNTU-CVE-2022-1328","UBUNTU-CVE-2024-49393","UBUNTU-CVE-2024-49394"],"upstream":["CVE-2018-14349","CVE-2018-14350","CVE-2018-14351","CVE-2018-14352","CVE-2018-14353","CVE-2018-14354","CVE-2018-14355","CVE-2018-14356","CVE-2018-14357","CVE-2018-14358","CVE-2018-14359","CVE-2018-14360","CVE-2018-14361","CVE-2018-14362","CVE-2018-14363","CVE-2020-14954","CVE-2020-28896","CVE-2021-32055","CVE-2022-1328","CVE-2024-49393","CVE-2024-49394","UBUNTU-CVE-2018-14349","UBUNTU-CVE-2018-14350","UBUNTU-CVE-2018-14351","UBUNTU-CVE-2018-14352","UBUNTU-CVE-2018-14353","UBUNTU-CVE-2018-14354","UBUNTU-CVE-2018-14355","UBUNTU-CVE-2018-14356","UBUNTU-CVE-2018-14357","UBUNTU-CVE-2018-14358","UBUNTU-CVE-2018-14359","UBUNTU-CVE-2018-14360","UBUNTU-CVE-2018-14361","UBUNTU-CVE-2018-14362","UBUNTU-CVE-2018-14363","UBUNTU-CVE-2020-14954","UBUNTU-CVE-2020-28896","UBUNTU-CVE-2021-32055","UBUNTU-CVE-2022-1328","UBUNTU-CVE-2024-49393","UBUNTU-CVE-2024-49394"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7204-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14349"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14350"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14351"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14352"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14353"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14354"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14355"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14356"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14357"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14358"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14359"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14360"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14361"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14362"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14363"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-14954"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-28896"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-32055"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1328"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-49393"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-49394"}],"affected":[{"package":{"name":"neomutt","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/neomutt@20171215+dfsg.1-1ubuntu0.1~esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20171215+dfsg.1-1ubuntu0.1~esm1"}]}],"versions":["20171027-1","20171027-2","20171027+dfsg.1-1","20171027+dfsg.1-2","20171027+dfsg.1-4","20171208+dfsg.1-1","20171208+dfsg.1-2","20171215+dfsg.1-1"],"ecosystem_specific":{"binaries":[{"binary_name":"neomutt","binary_version":"20171215+dfsg.1-1ubuntu0.1~esm1"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2018-14349","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-14350","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-14351","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-14352","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-14353","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-14354","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-14355","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-14356","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-14357","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-14358","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-14359","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-14360","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-14361","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-14362","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-14363","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-14954","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-28896","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-1328","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7204-1.json"}},{"package":{"name":"neomutt","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/neomutt@20191207+dfsg.1-1.1ubuntu0.1~esm1?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20191207+dfsg.1-1.1ubuntu0.1~esm1"}]}],"versions":["20180716+dfsg.1-1.2","20191111+dfsg.1-1","20191207+dfsg.1-1.1"],"ecosystem_specific":{"binaries":[{"binary_name":"neomutt","binary_version":"20191207+dfsg.1-1.1ubuntu0.1~esm1"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2020-14954","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-28896","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-32055","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-1328","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-49393","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2024-49394","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7204-1.json"}},{"package":{"name":"neomutt","ecosystem":"Ubuntu:Pro:22.04:LTS","purl":"pkg:deb/ubuntu/neomutt@20211029+dfsg1-1ubuntu0.1~esm1?arch=source&distro=esm-apps/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20211029+dfsg1-1ubuntu0.1~esm1"}]}],"versions":["20201127+dfsg.1-1.2","20211029+dfsg1-1"],"ecosystem_specific":{"binaries":[{"binary_name":"neomutt","binary_version":"20211029+dfsg1-1ubuntu0.1~esm1"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2022-1328","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2024-49393","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2024-49394","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7204-1.json"}},{"package":{"name":"neomutt","ecosystem":"Ubuntu:Pro:24.04:LTS","purl":"pkg:deb/ubuntu/neomutt@20231103+dfsg1-1ubuntu0.1~esm1?arch=source&distro=esm-apps/noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20231103+dfsg1-1ubuntu0.1~esm1"}]}],"versions":["20220429+dfsg1-4.1","20231103+dfsg1-1","20231103+dfsg1-1build2","20231103+dfsg1-1build3"],"ecosystem_specific":{"binaries":[{"binary_name":"neomutt","binary_version":"20231103+dfsg1-1ubuntu0.1~esm1"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2024-49393","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2024-49394","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:24.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7204-1.json"}}],"schema_version":"1.7.3"}