CVE-2018-15587
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/02/2019
Last modified:
10/06/2019
Description
GNOME Evolution through 3.28.2 is prone to OpenPGP signatures being spoofed for arbitrary messages using a specially crafted email that contains a valid signature from the entity to be impersonated as an attachment.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gnome:evolution:*:*:*:*:*:*:*:* | 3.28.2 (including) | |
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00061.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00024.html
- http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
- http://seclists.org/fulldisclosure/2019/Apr/38
- http://www.openwall.com/lists/oss-security/2019/04/30/4
- https://bugzilla.gnome.org/show_bug.cgi?id=796424
- https://github.com/RUB-NDS/Johnny-You-Are-Fired
- https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
- https://lists.debian.org/debian-lts-announce/2019/04/msg00027.html
- https://seclists.org/bugtraq/2019/Jun/7
- https://usn.ubuntu.com/3998-1/
- https://www.debian.org/security/2019/dsa-4457



