First published: Tue May 21 2019(Updated: )
Enigmail before 2.0.11 allows PGP signature spoofing: for an inline PGP message, an attacker can cause the product to display a "correctly signed" message indication, but display different unauthenticated text.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Enigmail Enigmail | <2.0.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12269 is a vulnerability in Enigmail before version 2.0.11 that allows PGP signature spoofing.
For an inline PGP message, an attacker can cause Enigmail to display a "correctly signed" message indication, but display different unauthenticated text.
CVE-2019-12269 has a severity level of high, with a CVSS score of 7.5.
Enigmail versions up to and exclusive of 2.0.11 are affected by CVE-2019-12269.
Upgrade Enigmail to version 2.0.11 or later to fix CVE-2019-12269.