First published: Mon Aug 05 2019(Updated: )
In Enigmail below 2.1, an attacker in possession of PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, he unknowingly leaks the plaintext of the encrypted message part(s) back to the attacker. This attack variant bypasses protection mechanisms implemented after the "EFAIL" attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Enigmail Enigmail | <2.1 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-14664 is medium with a CVSS score of 6.5.
Enigmail versions below 2.1 and Fedora versions 30, 31, and 32 are affected by CVE-2019-14664.
An attacker in possession of PGP encrypted emails can craft a multipart email, hiding the encrypted parts using HTML/CSS or ASCII newline characters.
Update Enigmail to version 2.1 or later, and update Fedora to the latest available version.
More information about CVE-2019-14664 can be found at the following references: [Reference 1](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVNTEF3WSOOQYKMIPEH7F77UPXES5BU5/), [Reference 2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CYWBJHSBBLAHKMRWDWH2XXQDYAGDHB5I/), [Reference 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHC5WDQ47FQSL5CTGQUYIHVC3RNZ7UH5/)