Vulnerability identifier: #VU13372
Vulnerability risk: Low
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-12019
CWE-ID:
CWE-451
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Enigmail
Web applications /
Webmail solutions
Vendor: enigmail.mozdev.org
Description
The vulnerability allows a remote attacker to conduct spoofing attack.
The vulnerability exists due to the signature verification routine interprets user ids as status/control messages and does not correctly keep track of the status of multiple signatures. A remote attacker can spoof arbitrary email signatures via public keys containing crafted primary user ids and gain access to potentially sensitive information.
Mitigation
Update to version 2.0.7.
Vulnerable software versions
Enigmail: 0.92.0 - 1.9.9
External links
https://www.enigmail.net/index.php/en/download/changelog
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.