Improper Verification of Cryptographic Signature in Enigmail - CVE-2017-17848

 

Improper Verification of Cryptographic Signature in Enigmail - CVE-2017-17848

Published: December 27, 2017 / Updated: July 17, 2020


Vulnerability identifier: #VU31380
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2017-17848
CWE-ID: CWE-347
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: enigmail.mozdev.org
Affected software:
Enigmail

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

An issue was discovered in Enigmail before 1.9.9. In a variant of CVE-2017-17847, signature spoofing is possible for multipart/related messages because a signed message part can be referenced with a cid: URI but not actually displayed. In other words, the entire containing message appears to be signed, but the recipient does not see any of the signed text.


How to mitigate CVE-2017-17848

Install update from vendor's website.

Sources