First published: Wed Sep 25 2019(Updated: )
A crafted S/MIME message consisting of an inner encryption layer and an outer SignedData layer was shown as having a valid digital signature, although the signer might have had no access to the contents of the encrypted message, and might have stripped a different signature from the encrypted message. Previous versions had only suppressed showing a digital signature for messages with an outer multipart/signed layer.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <68.1.1 | |
Mozilla Thunderbird | <68.1.1 | 68.1.1 |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:128.7.0esr-1~deb11u1 1:128.5.0esr-1~deb12u1 1:128.7.0esr-1~deb12u1 1:128.6.0esr-1 1:128.7.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11755 is a vulnerability in S/MIME where a crafted message with an encryption layer and a SignedData layer may show a valid digital signature despite the signer not having access to the encrypted message.
Mozilla Thunderbird versions up to 68.1.1 and some versions of Thunderbird in Debian and Ubuntu are affected.
The severity of CVE-2019-11755 is high with a CVSS score of 7.5.
Update Mozilla Thunderbird to version 68.2.1 or later, or follow the recommended package updates for Debian and Ubuntu.
You can find more information about CVE-2019-11755 in the references provided: [Mozilla Bugzilla](https://bugzilla.mozilla.org/show_bug.cgi?id=1240290), [Mozilla Security Advisories](https://www.mozilla.org/en-US/security/advisories/mfsa2019-32/), [CVE Mitre](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755).