CVE-2018-12019

EUVD-2018-4010
The signature verification routine in Enigmail before 2.0.7 interprets user ids as status/control messages and does not correctly keep track of the status of multiple signatures, which allows remote attackers to spoof arbitrary email signatures via public keys containing crafted primary user ids.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 65%
Affected Products (NVD)
VendorProductVersion
enigmailenigmail
𝑥
< 2.0.7
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
enigmail
bullseye
2:2.2.4-0.3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
enigmail
artful
ignored
bionic
needed
cosmic
ignored
disco
ignored
eoan
ignored
focal
needed
groovy
ignored
hirsute
ignored
impish
ignored
jammy
needed
kinetic
ignored
lunar
not-affected
mantic
not-affected
noble
dne
trusty
dne
xenial
needed