First published: Wed Jun 13 2018(Updated: )
The signature verification routine in Enigmail before 2.0.7 interprets user ids as status/control messages and does not correctly keep track of the status of multiple signatures, which allows remote attackers to spoof arbitrary email signatures via public keys containing crafted primary user ids.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Enigmail Enigmail | <2.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12019 is a vulnerability in Enigmail before 2.0.7 that allows remote attackers to spoof arbitrary email signatures.
The severity of CVE-2018-12019 is high with a severity value of 7.5.
CVE-2018-12019 affects Enigmail versions up to and including 2.0.7.
Remote attackers can exploit CVE-2018-12019 by using crafted primary user ids in public keys to spoof arbitrary email signatures.
Yes, here are some references related to CVE-2018-12019: [http://openwall.com/lists/oss-security/2018/06/13/10](http://openwall.com/lists/oss-security/2018/06/13/10), [http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html](http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html), [http://seclists.org/fulldisclosure/2019/Apr/38](http://seclists.org/fulldisclosure/2019/Apr/38).