Description
mutt before 2.3.2 sometimes uses strfcpy instead of memcpy for the IMAP auth_cram MD5 digest.
Published: 2026-05-04
Score: 3.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Mutt before version 2.3.2 sometimes copies the IMAP CRAM‑MD5 authentication digest using the strfcpy function instead of memcpy. This incorrect copy operation can lead to a buffer overrun or truncation of the digest, corrupting memory and potentially causing a crash or denial of service to the mail client. The vulnerability does not provide a clear path to arbitrary code execution but could be leveraged to destabilize the application during an IMAP authentication session.

Affected Systems

The affected product is the open‑source mail user agent Mutt from the mutt project. All releases prior to 2.3.2 are vulnerable, while version 2.3.2 and later include the fix that replaces strfcpy with the correct memcpy usage.

Risk and Exploitability

The CVSS score of 3.7 indicates moderate severity, and the EPSS score is not available, so the actual exploitation probability is uncertain. The vulnerability is not listed in the CISA KEV catalog, suggesting it is not a widely recognized or actively exploited issue. Based on the description, the likely attack vector is remote or local via IMAP authentication, requiring an attacker to trigger the CRAM‑MD5 digest path to induce memory corruption. The impact is primarily application instability rather than privilege escalation or data exfiltration.

Generated by OpenCVE AI on May 4, 2026 at 07:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official Mutt patch that replaces strfcpy with memcpy for IMAP CRAM‑MD5 digest handling (see the GitHub commit referenced in the advisory).
  • Upgrade to Mutt version 2.3.2 or newer, which includes the fix in the code base.
  • If an upgrade is not immediately possible, disable IMAP authentication or disable the CRAM‑MD5 mechanism if the client supports selective authentication methods, to avoid the vulnerable code path.

Generated by OpenCVE AI on May 4, 2026 at 07:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 May 2026 07:45:00 +0000

Type Values Removed Values Added
Title Potential Buffer Overflow in Mutt IMAP CRAM‑MD5 Authentication

Mon, 04 May 2026 06:45:00 +0000

Type Values Removed Values Added
Description mutt before 2.3.2 sometimes uses strfcpy instead of memcpy for the IMAP auth_cram MD5 digest.
First Time appeared Mutt
Mutt mutt
Weaknesses CWE-158
CPEs cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*
Vendors & Products Mutt
Mutt mutt
References
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-04T18:20:07.821Z

Reserved: 2026-05-04T05:41:07.104Z

Link: CVE-2026-43859

cve-icon Vulnrichment

Updated: 2026-05-04T12:49:43.399Z

cve-icon NVD

Status : Received

Published: 2026-05-04T07:16:00.400

Modified: 2026-05-04T07:16:00.400

Link: CVE-2026-43859

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T08:00:09Z

Weaknesses