Описание
An issue was discovered in Enigmail before 1.9.9 that allows remote attackers to trigger use of an intended public key for encryption, because incorrect regular expressions are used for extraction of an e-mail address from a comma-separated list, as demonstrated by a modified Full Name field and a homograph attack, aka TBE-01-002.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | released | 2:1.9.9-0ubuntu0.17.10.1 |
| devel | not-affected | 2:1.9.9-1 |
| esm-apps/xenial | released | 2:1.9.9-0ubuntu0.16.04.1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [2:1.9.9-0ubuntu0.14.04.1]] |
| precise/esm | DNE | |
| trusty | released | 2:1.9.9-0ubuntu0.14.04.1 |
| trusty/esm | DNE | trusty was released [2:1.9.9-0ubuntu0.14.04.1] |
| upstream | released | 2:1.9.9-1 |
| xenial | released | 2:1.9.9-0ubuntu0.16.04.1 |
| zesty | ignored | end of life |
Показывать по
Ссылки на источники
4.3 Medium
CVSS2
5.9 Medium
CVSS3
Связанные уязвимости
An issue was discovered in Enigmail before 1.9.9 that allows remote attackers to trigger use of an intended public key for encryption, because incorrect regular expressions are used for extraction of an e-mail address from a comma-separated list, as demonstrated by a modified Full Name field and a homograph attack, aka TBE-01-002.
An issue was discovered in Enigmail before 1.9.9 that allows remote at ...
An issue was discovered in Enigmail before 1.9.9 that allows remote attackers to trigger use of an intended public key for encryption, because incorrect regular expressions are used for extraction of an e-mail address from a comma-separated list, as demonstrated by a modified Full Name field and a homograph attack, aka TBE-01-002.
4.3 Medium
CVSS2
5.9 Medium
CVSS3