CVE Vulnerabilities

CVE-2018-12019

Improper Verification of Cryptographic Signature

Published: Jun 13, 2018 | Modified: May 16, 2019
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

The signature verification routine in Enigmail before 2.0.7 interprets user ids as status/control messages and does not correctly keep track of the status of multiple signatures, which allows remote attackers to spoof arbitrary email signatures via public keys containing crafted primary user ids.

Weakness

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

Affected Software

Name Vendor Start Version End Version
Enigmail Enigmail * 2.0.7 (excluding)
Enigmail Ubuntu artful *
Enigmail Ubuntu bionic *
Enigmail Ubuntu cosmic *
Enigmail Ubuntu disco *
Enigmail Ubuntu eoan *
Enigmail Ubuntu esm-apps/bionic *
Enigmail Ubuntu esm-apps/focal *
Enigmail Ubuntu esm-apps/jammy *
Enigmail Ubuntu esm-apps/xenial *
Enigmail Ubuntu focal *
Enigmail Ubuntu groovy *
Enigmail Ubuntu hirsute *
Enigmail Ubuntu impish *
Enigmail Ubuntu jammy *
Enigmail Ubuntu kinetic *
Enigmail Ubuntu trusty *
Enigmail Ubuntu upstream *
Enigmail Ubuntu xenial *

References