First published: Mon Sep 08 2014(Updated: )
Enigmail 1.7.x before 1.7.2 sends emails in plaintext when encryption is enabled and only BCC recipients are specified, which allows remote attackers to obtain sensitive information by sniffing the network.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Enigmail | =1.7 | |
Enigmail | =1.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5369 has a medium severity rating due to its potential to expose sensitive information.
To fix CVE-2014-5369, update Enigmail to version 1.7.2 or later.
The risks associated with CVE-2014-5369 include the possibility of remote attackers obtaining sensitive email content by listening to network traffic.
Enigmail versions 1.7.x prior to 1.7.2 are affected by CVE-2014-5369.
A workaround for CVE-2014-5369 is to avoid sending emails with only BCC recipients while encryption is enabled until the software can be updated.