Bug 1762818 (CVE-2019-11755) - CVE-2019-11755 thunderbird: spoofing a message author via a crafted S/MIME
Summary: CVE-2019-11755 thunderbird: spoofing a message author via a crafted S/MIME
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2019-11755
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1762985
Blocks: 1762820
TreeView+ depends on / blocked
 
Reported: 2019-10-17 14:58 UTC by kat
Modified: 2021-02-16 21:13 UTC (History)
13 users (show)

Fixed In Version: thunderbird 68.1.1
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-10-21 06:51:11 UTC
Embargoed:


Attachments (Terms of Use)

Description kat 2019-10-17 14:58:35 UTC
A crafted S/MIME message consisting of an inner encryption layer and an outer SignedData layer was shown as having a valid digital signature, although the signer might have had no access to the contents of the encrypted message, and might have stripped a different signature from the encrypted message. Previous versions had only suppressed showing a digital signature for messages with an outer multipart/signed layer.

External References:
https://bugzilla.mozilla.org/show_bug.cgi?id=1240290
https://www.mozilla.org/en-US/security/advisories/mfsa2019-32/#CVE-2019-11755
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html

Comment 2 Sam Fowler 2019-10-18 00:17:10 UTC
Created thunderbird tracking bugs for this issue:

Affects: fedora-all [bug 1762985]

Comment 3 Doran Moppert 2019-10-21 01:18:52 UTC
This vulnerability was reported in Thunderbird 68.1; Thunderbird 60.9 appears to be not affected.

Comment 4 Doran Moppert 2019-10-21 01:18:55 UTC
External References:

https://www.mozilla.org/en-US/security/advisories/mfsa2019-32/

Comment 5 Product Security DevOps Team 2019-10-21 06:51:11 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-11755


Note You need to log in before you can comment on or make changes to this bug.