Enigmail GnuPG Arbitrary Content Injection Vulnerability
BID:22758
Info
Enigmail GnuPG Arbitrary Content Injection Vulnerability
| Bugtraq ID: | 22758 |
| Class: | Design Error |
| CVE: |
CVE-2007-1264 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 05 2007 12:00AM |
| Updated: | Mar 06 2007 06:35PM |
| Credit: | This vulnerability was found by Gerardo Richarte from Core Security Technologies. |
| Vulnerable: |
Mozilla Enigmail 0.94.2 Mozilla Enigmail 0.92.1 Mozilla Enigmail 0.91 Mozilla Enigmail 0.89 Mozilla Enigmail 0.76.8 Mozilla Enigmail 0.75.1 Mozilla Enigmail 0.94 Mozilla Enigmail 0 |
| Not Vulnerable: | |
Discussion
Enigmail GnuPG Arbitrary Content Injection Vulnerability
Enigmail is prone to a vulnerability that may allow an attacker to add arbitrary content into a message without the end user knowing.
An attacker may be able to exploit this issue to add arbitrary content into a GnuPG signed and/or encrypted message.
This vulnerability is due to the weakness discussed in BID 22757 (GnuPG Signed Message Arbitrary Content Injection Weakness) and has been assigned its own BID because of the specific way that Enigmail uses GnuPG.
This issue affects Enigmail versions prior to and including 0.94.2.
Enigmail is prone to a vulnerability that may allow an attacker to add arbitrary content into a message without the end user knowing.
An attacker may be able to exploit this issue to add arbitrary content into a GnuPG signed and/or encrypted message.
This vulnerability is due to the weakness discussed in BID 22757 (GnuPG Signed Message Arbitrary Content Injection Weakness) and has been assigned its own BID because of the specific way that Enigmail uses GnuPG.
This issue affects Enigmail versions prior to and including 0.94.2.
Exploit / POC
Enigmail GnuPG Arbitrary Content Injection Vulnerability
The reporter of this issue has supplied multiple proof-of-concept examples demonstrating this issue. Please see the attached advisory for more information.
The reporter of this issue has supplied multiple proof-of-concept examples demonstrating this issue. Please see the attached advisory for more information.
Solution / Fix
Enigmail GnuPG Arbitrary Content Injection Vulnerability
Solution:
The vendor has released a patch to address this issue. Please see the references for details on obtaining and applying the appropriate updates.
Solution:
The vendor has released a patch to address this issue. Please see the references for details on obtaining and applying the appropriate updates.
References
Enigmail GnuPG Arbitrary Content Injection Vulnerability
References:
References:
- Enigmail Project Page (Mozilla)
- GnuPG Homepage (GnuPG)
- Impacket library (Core Security)
- CORE-2007-0115: GnuPG and GnuPG clients unsigned data injection vulnerability (CORE Security Technologies Advisories
)