First published: Tue Oct 18 2005(Updated: )
The key selection dialogue in Enigmail before 0.92.1 can incorrectly select a key with a user ID that does not have additional information, which allows parties with that key to decrypt the message.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Enigmail | <=0.92.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3256 is classified as a moderate severity vulnerability.
To fix CVE-2005-3256, you should upgrade Enigmail to version 0.92.1 or later.
Users of Enigmail versions prior to 0.92.1 are affected by CVE-2005-3256.
CVE-2005-3256 poses risks such as unauthorized decryption of sensitive messages.
Yes, CVE-2005-3256 could potentially be exploited by malicious parties to decrypt intercepted messages.