First published: Fri Feb 15 2019(Updated: )
GNOME Evolution through 3.28.2 is prone to OpenPGP signatures being spoofed for arbitrary messages using a specially crafted email that contains a valid signature from the entity to be impersonated as an attachment. Upstream issues : <a href="https://bugzilla.gnome.org/show_bug.cgi?id=796424">https://bugzilla.gnome.org/show_bug.cgi?id=796424</a> Upstream Patch: <a href="https://gitlab.gnome.org/GNOME/evolution/commit/f66cd3e1db301d264563b4222a3574e2e58e2b85">https://gitlab.gnome.org/GNOME/evolution/commit/f66cd3e1db301d264563b4222a3574e2e58e2b85</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME Evolution | <=3.28.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1677650 is classified as a security vulnerability affecting GNOME Evolution.
To fix REDHAT-BUG-1677650, update GNOME Evolution to a version later than 3.28.2 where this vulnerability has been addressed.
REDHAT-BUG-1677650 is an OpenPGP signature spoofing vulnerability that can be exploited through specially crafted emails.
Users of GNOME Evolution versions up to and including 3.28.2 are affected by REDHAT-BUG-1677650.
Yes, if exploited, REDHAT-BUG-1677650 can allow an attacker to impersonate users and potentially compromise sensitive data.