CVE Vulnerabilities

CVE-2018-12019

Improper Verification of Cryptographic Signature

Published: Jun 13, 2018 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The signature verification routine in Enigmail before 2.0.7 interprets user ids as status/control messages and does not correctly keep track of the status of multiple signatures, which allows remote attackers to spoof arbitrary email signatures via public keys containing crafted primary user ids.

Weakness

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

Affected Software

NameVendorStart VersionEnd Version
EnigmailEnigmail*2.0.7 (excluding)
EnigmailUbuntuartful*
EnigmailUbuntubionic*
EnigmailUbuntucosmic*
EnigmailUbuntudisco*
EnigmailUbuntueoan*
EnigmailUbuntuesm-apps/bionic*
EnigmailUbuntuesm-apps/focal*
EnigmailUbuntuesm-apps/jammy*
EnigmailUbuntuesm-apps/xenial*
EnigmailUbuntufocal*
EnigmailUbuntugroovy*
EnigmailUbuntuhirsute*
EnigmailUbuntuimpish*
EnigmailUbuntujammy*
EnigmailUbuntukinetic*
EnigmailUbuntutrusty*
EnigmailUbuntuupstream*
EnigmailUbuntuxenial*

References