Input validation error in JavaMail API (compat) - CVE-2019-10735

 

Input validation error in JavaMail API (compat) - CVE-2019-10735

Published: April 7, 2019 / Updated: August 8, 2020


Vulnerability identifier: #VU36022
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2019-10735
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Javax Mail
Affected software:
JavaMail API (compat)

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

In Claws Mail 3.14.1, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, they unknowingly leak the plaintext of the encrypted message part(s) back to the attacker.


How to mitigate CVE-2019-10735

Install update from vendor's website.

Sources