Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-31855 |
CWE-ID | CWE-200 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
messagelib Universal components / Libraries / Libraries used by multiple products kmail Client/Desktop applications / Other client software |
Vendor | KDE.org |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU52766
Risk: Medium
CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2021-31855
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the way messagelib in KDE KMail deletes attachments of encrypted messages on a remote server (e.g. an IMAP server). A remote attacker can send a victim a specially crafted encrypted message and trick the victim into deleting an attachments from such message. If the attacker has access to the messages stored on the email server, then the attacker could read the decrypted content of the encrypted message.
Install updates from vendor's website.
Vulnerable software versionsmessagelib: 16.03.80 - 21.04.0
kmail: 4.11.5 - 21.04.0
External linkshttp://kde.org/info/security/advisory-20210429-1.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.