First published: Mon Feb 18 2019(Updated: )
It was discovered evolution-ews before 3.31.3 does not check the validity of SSL certificates. An attacker could abuse this flaw to get confidential information by tricking the user into connecting to a fake server without the user noticing the difference.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/evolution-ewx | <3.31.3 | 3.31.3 |
GNOME Evolution | <3.31.3 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3890 is considered a critical vulnerability due to its potential to expose confidential information.
To fix CVE-2019-3890, upgrade to Evolution-ews version 3.31.3 or later.
CVE-2019-3890 affects versions of Evolution-ews prior to 3.31.3.
The risk associated with CVE-2019-3890 is that attackers can intercept and obtain sensitive data by exploiting the SSL certificate validation flaw.
Users of Evolution-ews prior to version 3.31.3 are at risk of being duped into connecting to malicious servers.