https://www.enigmail.net/index.php/en/download/changelog#enig1.9.9 enigmail released 2017-12-19 fixes security vulnerabilities discovered by Cure53. https://www.enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf TBE-01-002 Enigmail: Weak Parsing Causes Confidentiality Compromise Enigmail can be coerced to use a malicious PGP public key with a corresponding secret key controlled by an attacker. Problem in funcs.jm strimEmail e.g. <good,><evil> TBE-01-005 Enigmail: Replay of encrypted Contents leads to Plaintext Leak * an e-mail block is encrypted to the victim but not readable to attacker * encrypted data block into the email’s body and send to victim (e.g. down in the thread) * e-mail is decrypted by victim and sent in reply in clear TBE-01-021 Enigmail: Flawed parsing allows faked Signature Display * display issue with signed attachments TBE-01-001 Enigmail: Insecure Random Secret Generation 1.9.8.3 does not have the pEp code yet.. TBE-01-003 Enigmail: Regular Expressions Exploitable for Denial of Service DOS regex parsing issue finding the block begin headers Overall fix: https://sourceforge.net/p/enigmail/source/ci/9cd82c5bd7b816525a85eb0d8ddf3accd96097f9 Affects 1.9.8.3, fixed in 1.9.9
Created thunderbird-enigmail tracking bugs for this issue: Affects: epel-7 [bug 1528404] Affects: fedora-all [bug 1528403]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.