CVE-2021-32055

9.1 CRITICAL

📋 TL;DR

CVE-2021-32055 is an out-of-bounds read vulnerability in Mutt and NeoMutt email clients when processing malformed IMAP sequence sets with QRESYNC enabled. This could allow attackers to read sensitive memory contents or cause application crashes. Only users with the non-default $imap_qresync setting enabled are affected.

💻 Affected Systems

Products:
  • Mutt
  • NeoMutt
Versions: Mutt 1.11.0 through 2.0.6, NeoMutt 2019-10-25 through 2021-05-04
Operating Systems: All platforms running affected Mutt/NeoMutt versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when $imap_qresync setting is explicitly enabled (disabled by default). QRESYNC is an IMAP extension for mailbox synchronization.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure of sensitive memory contents, potentially including authentication credentials or email content, leading to complete compromise of email accounts.

🟠

Likely Case

Application crash (denial of service) when processing specially crafted IMAP responses from a malicious server.

🟢

If Mitigated

No impact since the vulnerable feature is disabled by default and requires explicit configuration.

🌐 Internet-Facing: MEDIUM - Requires connecting to a malicious IMAP server, which is plausible for email clients.
🏢 Internal Only: LOW - Requires internal malicious IMAP server, which is less likely in controlled environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires a malicious IMAP server that the client connects to, and the client must have QRESYNC enabled. The attacker needs to control or compromise an IMAP server that the victim connects to.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Mutt 2.0.7, NeoMutt after 2021-05-04

Vendor Advisory: http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20210503/000036.html

Restart Required: Yes

Instructions:

1. Update Mutt to version 2.0.7 or later. 2. Update NeoMutt to a version after 2021-05-04. 3. Restart the Mutt/NeoMutt application after updating.

🔧 Temporary Workarounds

Disable QRESYNC feature

all

Disable the vulnerable $imap_qresync setting in Mutt/NeoMutt configuration

Add 'unset imap_qresync' to your .muttrc or neomuttrc configuration file

🧯 If You Can't Patch

  • Disable $imap_qresync setting in configuration files
  • Avoid connecting to untrusted or unknown IMAP servers

🔍 How to Verify

Check if Vulnerable:

Check if $imap_qresync is set in your configuration and verify Mutt/NeoMutt version is in affected range

Check Version:

mutt -v | grep 'Mutt' or neomutt -v | grep 'NeoMutt'

Verify Fix Applied:

Verify Mutt version is 2.0.7+ or NeoMutt version is after 2021-05-04, and check that $imap_qresync is either unset or disabled

📡 Detection & Monitoring

Log Indicators:

  • Application crashes or segmentation faults when processing IMAP responses
  • Error messages related to IMAP sequence parsing

Network Indicators:

  • Connections to suspicious or unknown IMAP servers

SIEM Query:

process_name IN ('mutt', 'neomutt') AND event_type='crash'

🔗 References

📤 Share & Export