CVE-2019-8338

The signature verification routine in the Airmail GPG-PGP Plugin, versions 1.0 (9) and earlier, does not verify the status of the signature at all, which allows remote attackers to spoof arbitrary email signatures by crafting a signed email with an invalid signature. Also, it does not verify the validity of the signing key, which allows remote attackers to spoof arbitrary email signatures by crafting a key with a fake user ID (email address) and injecting it into the user's keyring.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:gpg-pgp_project:gpg-pgp:*:*:*:*:*:airmail:*:*

Information

Published : 2019-05-16 10:29

Updated : 2019-05-21 07:07


NVD link : CVE-2019-8338

Mitre link : CVE-2019-8338


JSON object : View

CWE
CWE-347

Improper Verification of Cryptographic Signature

Advertisement

dedicated server usa

Products Affected

gpg-pgp_project

  • gpg-pgp