Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 07 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Potential Buffer Overflow in Mutt IMAP CRAM‑MD5 Authentication | mutt: Mutt: Low integrity impact in IMAP authentication due to cryptographic digest mishandling |
| Weaknesses | CWE-303 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 04 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Potential Buffer Overflow in Mutt IMAP CRAM‑MD5 Authentication |
Mon, 04 May 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | mutt before 2.3.2 sometimes uses strfcpy instead of memcpy for the IMAP auth_cram MD5 digest. | |
| First Time appeared |
Mutt
Mutt mutt |
|
| Weaknesses | CWE-158 | |
| CPEs | cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Mutt
Mutt mutt |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-04T18:20:07.821Z
Reserved: 2026-05-04T05:41:07.104Z
Link: CVE-2026-43859
Updated: 2026-05-04T12:49:43.399Z
Status : Deferred
Published: 2026-05-04T07:16:00.400
Modified: 2026-05-05T19:44:42.893
Link: CVE-2026-43859
OpenCVE Enrichment
Updated: 2026-05-07T16:15:09Z