First published: Mon Feb 11 2019(Updated: )
GNOME Evolution through 3.28.2 is prone to OpenPGP signatures being spoofed for arbitrary messages using a specially crafted email that contains a valid signature from the entity to be impersonated as an attachment.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME Evolution | <=3.28.2 | |
Debian Debian Linux | =8.0 | |
ubuntu/evolution | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution-data-server | <3.28.5-0ubuntu0.18.04.2 | 3.28.5-0ubuntu0.18.04.2 |
ubuntu/evolution-data-server | <3.30.5-0ubuntu0.18.10.1 | 3.30.5-0ubuntu0.18.10.1 |
ubuntu/evolution-data-server | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution-data-server | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution-data-server | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution-data-server | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution-data-server | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution-data-server | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution-data-server | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution-data-server | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution-data-server | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution-data-server | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution-data-server | <3.31.90-1 | 3.31.90-1 |
ubuntu/evolution-data-server | <3.18.5-1ubuntu1.2 | 3.18.5-1ubuntu1.2 |
debian/evolution | 3.38.3-1+deb11u2 3.46.4-2 3.53.2-1 |
https://gitlab.gnome.org/GNOME/evolution-data-server/commit/93306a296c64b48d12c356804f131048643eaa0a
https://gitlab.gnome.org/GNOME/evolution-data-server/commit/accb0e2415681565e4dac00cf1c4303c313ad29e
https://gitlab.gnome.org/GNOME/evolution-data-server/commit/5cd59aee67450e8750eb3cb2d357d0947f199f61
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this GNOME Evolution vulnerability is CVE-2018-15587.
The severity of CVE-2018-15587 is medium.
GNOME Evolution through 3.28.2 is affected by CVE-2018-15587.
The OpenPGP signatures spoofing vulnerability can be exploited by using a specially crafted email that contains a valid signature from the entity to be impersonated as an attachment.
Yes, the remediation for CVE-2018-15587 is to update to version 3.31.90-1 or later.