Spoofing attack in Enigmail - CVE-2018-12019
Published: June 15, 2018 / Updated: June 17, 2018
Enigmail
Detailed vulnerability description
The vulnerability allows a remote attacker to conduct spoofing attack.
The vulnerability exists due to the signature verification routine interprets user ids as status/control messages and does not correctly keep track of the status of multiple signatures. A remote attacker can spoof arbitrary email signatures via public keys containing crafted primary user ids and gain access to potentially sensitive information.