An attacker could trick mutt into trusting a rogue server.
It was discovered that mutt incorrectly verified the hostname in an SSL certificate. An attacker could trick mutt into trusting a rogue SMTPS, IMAPS, or POP3S server’s certificate, which was signed by a trusted certificate authority, to perform a man-in-the-middle attack.
29 September 2011
A security issue affects these releases of Ubuntu and its derivatives:
An attacker could trick mutt into trusting a rogue server.
It was discovered that mutt incorrectly verified the hostname in an SSL certificate. An attacker could trick mutt into trusting a rogue SMTPS, IMAPS, or POP3S server’s certificate, which was signed by a trusted certificate authority, to perform a man-in-the-middle attack.
The problem can be corrected by updating your system to the following package versions:
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to restart mutt to make all the necessary changes. Users are encouraged to verify their ~/.mutt_certificates file to ensure only trusted certificates are listed.