First published: Mon Feb 11 2019(Updated: )
Enigmail before 2.0.6 is prone to to OpenPGP signatures being spoofed for arbitrary messages using a PGP/INLINE signature wrapped within a specially crafted multipart HTML email.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Enigmail Enigmail | <2.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2018-15586.
The severity of CVE-2018-15586 is medium with a CVSS score of 6.5.
The affected software for CVE-2018-15586 is Enigmail version up to 2.0.6.
An attacker can exploit CVE-2018-15586 by spoofing OpenPGP signatures for arbitrary messages using a specially crafted multipart HTML email.
Yes, there are references available for CVE-2018-15586. You can find them at the following links: [link1], [link2], [link3].