Back to VulnFeed / CVE-2026-43863
root@hackertop:~/vulnfeed/CVE-2026-43863#
CVE-2026-43863 LOW CVE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

mutt up to 2.3.1 crypt-gpgme.c data_object_to_stream function return value

mutt 17d ago Impact pending confirmation
LIFECYCLE
3.3 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability, which was classified as problematic, has been found in mutt up to 2.3.1 (Mail Client Software). This issue affects the function data_object_to_stream of the file crypt-gpgme.c. Upgrading to version 2.3.2 eliminates this vulnerability. Applying the patch fdc04a171777327218a1e78db504926c388b48c4 is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Root Cause Analysis
Using CWE to declare the problem leads to CWE-253. The product incorrectly checks a return value from a function, which prevents it from detecting errors or exceptional conditions.

Impact: Impacted is availability.

Countermeasure: Upgrading to version 2.3.2 eliminates this vulnerability. Applying the patch fdc04a171777327218a1e78db504926c388b48c4 is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-43863 · CVSS 3.3 · Active Threat