Bug 1125079 (CVE-2018-15586) - VUL-1: CVE-2018-15586: enigmail: Enigmail before 2.0.6 is prone to to OpenPGP signatures being spoofed for arbitrary messages using a PGP/INLINE signature wrapped within a specially crafted multipart HTML email.
Summary: VUL-1: CVE-2018-15586: enigmail: Enigmail before 2.0.6 is prone to to OpenPGP...
Status: RESOLVED FIXED
Alias: CVE-2018-15586
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Minor
Target Milestone: ---
Assignee: Wolfgang Rosenauer
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/224577/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2019-02-12 06:31 UTC by Marcus Meissner
Modified: 2019-02-12 06:31 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2019-02-12 06:31:08 UTC
CVE-2018-15586

Enigmail before 2.0.6 is prone to to OpenPGP signatures being spoofed for
arbitrary messages using a PGP/INLINE signature wrapped within a specially
crafted multipart HTML email.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-15586
https://sourceforge.net/p/enigmail/bugs/849/
Comment 1 Marcus Meissner 2019-02-12 06:31:45 UTC
we are at 2.0.9 already