The signature verification routine in the Airmail GPG-PGP Plugin, versions 1.0 (9) and earlier, does not verify the status of the signature at all, which allows remote attackers to spoof arbitrary email signatures by crafting a signed email with an invalid signature. Also, it does not verify the validity of the signing key, which allows remote attackers to spoof arbitrary email signatures by crafting a key with a fake user ID (email address) and injecting it into the user's keyring.
The product does not verify, or incorrectly verifies, the cryptographic signature for data.
Link | Tags |
---|---|
https://github.com/Airmail/AirmailPlugIn-Framework/commits/master | third party advisory patch |
http://seclists.org/fulldisclosure/2019/Apr/38 | third party advisory mailing list |
http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html | vdb entry third party advisory |
https://www.openwall.com/lists/oss-security/2019/04/30/4 | third party advisory mailing list |
https://github.com/RUB-NDS/Johnny-You-Are-Fired | third party advisory |
https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf | third party advisory |