CVE-2014-5369

Current Description

Enigmail 1.7.x before 1.7.2 sends emails in plaintext when encryption is enabled and only BCC recipients are specified, which allows remote attackers to obtain sensitive information by sniffing the network.

Basic Data

PublishedSeptember 08, 2014
Last ModifiedDecember 22, 2016
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-310
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:P/I:N/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score4.3
SeverityMEDIUM
Exploitability Score8.6
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationEnigmailEnigmail1.7*******
    2.3ApplicationEnigmailEnigmail1.7.2*******

Vulnerable Software List

VendorProductVersions
Enigmail Enigmail 1.7, 1.7.2

References

NameSourceURLTags
openSUSE-SU-2014:1086http://lists.opensuse.org/opensuse-updates/2014-09/msg00004.htmlSUSE
openSUSE-SU-2014:1096http://lists.opensuse.org/opensuse-updates/2014-09/msg00008.htmlSUSE
60779http://secunia.com/advisories/60779SECUNIA
60887http://secunia.com/advisories/60887SECUNIA
61854http://secunia.com/advisories/61854SECUNIA
http://sourceforge.net/p/enigmail/bugs/294/http://sourceforge.net/p/enigmail/bugs/294/CONFIRMPATCH
http://sourceforge.net/p/enigmail/forum/support/thread/3e7268a4/http://sourceforge.net/p/enigmail/forum/support/thread/3e7268a4/CONFIRM
[oss-security] 20140818 Enigmail warninghttp://www.openwall.com/lists/oss-security/2014/08/18/2MLISTExploit
[oss-security] 20140821 Re: Enigmail warninghttp://www.openwall.com/lists/oss-security/2014/08/22/1MLIST
https://advisories.mageia.org/MGASA-2014-0421.htmlhttps://advisories.mageia.org/MGASA-2014-0421.htmlCONFIRM
GLSA-201504-01https://security.gentoo.org/glsa/201504-01GENTOO