Enigmail before 2.0.6 is prone to to OpenPGP signatures being spoofed for arbitrary messages using a PGP/INLINE signature wrapped within a specially crafted multipart HTML email.
The product does not verify, or incorrectly verifies, the cryptographic signature for data.
Link | Tags |
---|---|
https://sourceforge.net/p/enigmail/bugs/849/ | third party advisory exploit |
http://www.openwall.com/lists/oss-security/2019/04/30/4 | third party advisory mailing list |
http://seclists.org/fulldisclosure/2019/Apr/38 | third party advisory mailing list |
http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html | vdb entry third party advisory |
https://github.com/RUB-NDS/Johnny-You-Are-Fired | |
https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf |