Bug 830491 (CVE-2013-4166) - VUL-1: CVE-2013-4166: evolution: mail client GPG key selection issue
Summary: VUL-1: CVE-2013-4166: evolution: mail client GPG key selection issue
Status: RESOLVED FIXED
: 877655 (view as bug list)
Alias: CVE-2013-4166
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: CVSSv2:RedHat:CVE-2013-4166:1.2:(AV:L...
Keywords:
Depends on:
Blocks:
 
Reported: 2013-07-22 06:29 UTC by Sebastian Krahmer
Modified: 2020-07-10 15:02 UTC (History)
6 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sebastian Krahmer 2013-07-22 06:29:34 UTC
Sounds like a minor issue for factory.

Via OSS-sec:

From: Yves-Alexis Perez
To: oss-security
Date: Sun, 21 Jul 2013 22:02:16 +0200



[-- The following data is signed --]

Hi,

an issue with security impact was recently fixed in Evolution. More
details can be found on the Red Hat bug report at
https://bugzilla.redhat.com/show_bug.cgi?id=973728 but it basically
boils down to a wrong selection when choosing the the keyid for a
destination email address.

Basically, when you have multiple keys in the keyrings, with overlapping
email addresses (like foo@example.com and foobar@example.com), you can
end up (silently) encrypting to the wrong recipient.

It actually happened to me when forwarding embargoed security issues so
it can happen in real life. Now the wrong recipient would need to
actually obtain a copy of the sent mail (since it's sent to the correct
recipient, not the wrong one), but I still think it warrants a CVE.

Quick fix was to use the documented format for email searches in GnuPG
(using <> around email addresses) but a more complete fix for explicit
key selection should appear some time in the future.

Regards,
--
Yves-Alexis
Comment 1 Swamp Workflow Management 2013-07-22 22:00:27 UTC
bugbot adjusting priority
Comment 2 Marcus Meissner 2013-07-25 09:21:37 UTC
CVE-2013-4166
Comment 3 Sebastian Krahmer 2014-05-14 08:05:34 UTC
*** Bug 877655 has been marked as a duplicate of this bug. ***
Comment 4 SMASH SMASH 2014-05-14 08:10:24 UTC
Affected packages:

SLE-11-SP3: evolution
Comment 8 Swamp Workflow Management 2020-06-03 13:13:50 UTC
SUSE-SU-2020:14383-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 830491
CVE References: CVE-2013-4166
Sources used:
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    evolution-data-server-2.28.2-0.32.3.109

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Alexandros Toptsoglou 2020-07-10 15:02:44 UTC
Done