claws-mail: CVE-2019-10735

Related Vulnerabilities: CVE-2019-10735  

Debian Bug report logs - #926705
claws-mail: CVE-2019-10735

version graph

Reported by: Sylvain Beucler <beuc@beuc.net>

Date: Tue, 9 Apr 2019 11:33:01 UTC

Severity: important

Tags: confirmed, security, upstream

Found in version claws-mail/3.17.3-2

Forwarded to https://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=4159

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, Ricardo Mones <mones@debian.org>:
Bug#926705; Package claws-mail. (Tue, 09 Apr 2019 11:33:03 GMT) (full text, mbox, link).


Acknowledgement sent to Sylvain Beucler <beuc@beuc.net>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, Ricardo Mones <mones@debian.org>. (Tue, 09 Apr 2019 11:33:03 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Sylvain Beucler <beuc@beuc.net>
To: submit@bugs.debian.org
Subject: claws-mail: CVE-2019-10735
Date: Tue, 9 Apr 2019 13:24:21 +0200
Package: claws-mail
Version: 3.17.3-2
X-Debbugs-CC: team@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for claws-mail.

CVE-2019-10735[0]:
| In Claws Mail 3.14.1, an attacker in possession of S/MIME or PGP
| encrypted emails can wrap them as sub-parts within a crafted multipart
| email. The encrypted part(s) can further be hidden using HTML/CSS or
| ASCII newline characters. This modified multipart email can be re-sent
| by the attacker to the intended receiver. If the receiver replies to
| this (benign looking) email, they unknowingly leak the plaintext of
| the encrypted message part(s) back to the attacker.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-10735
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10735
https://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=4159

Cheers!
Sylvain




Set Bug forwarded-to-address to 'https://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=4159'. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Tue, 09 Apr 2019 11:45:05 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org:
Bug#926705; Package claws-mail. (Tue, 09 Apr 2019 14:06:03 GMT) (full text, mbox, link).


Acknowledgement sent to Ricardo Mones <mones@debian.org>:
Extra info received and forwarded to list. (Tue, 09 Apr 2019 14:06:03 GMT) (full text, mbox, link).


Message #12 received at 926705@bugs.debian.org (full text, mbox, reply):

From: Ricardo Mones <mones@debian.org>
To: Sylvain Beucler <beuc@beuc.net>, 926705@bugs.debian.org
Subject: Re: Bug#926705: claws-mail: CVE-2019-10735
Date: Tue, 9 Apr 2019 16:03:44 +0200
[Message part 1 (text/plain, inline)]
control: forwarded -1 https://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=4159
control: tags -1 confirmed upstream

On Tue, Apr 09, 2019 at 01:24:21PM +0200, Sylvain Beucler wrote:
> Package: claws-mail
> Version: 3.17.3-2
> X-Debbugs-CC: team@security.debian.org
> Severity: important
> Tags: security
> 
> Hi,
> 
> The following vulnerability was published for claws-mail.
> 
> CVE-2019-10735[0]:
> | In Claws Mail 3.14.1, an attacker in possession of S/MIME or PGP
> | encrypted emails can wrap them as sub-parts within a crafted multipart
> | email. The encrypted part(s) can further be hidden using HTML/CSS or
> | ASCII newline characters. This modified multipart email can be re-sent
> | by the attacker to the intended receiver. If the receiver replies to
> | this (benign looking) email, they unknowingly leak the plaintext of
> | the encrypted message part(s) back to the attacker.
> 
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2019-10735
>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10735
> https://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=4159
> 
> Cheers!
> Sylvain

Alright, thanks.
-- 
  Ricardo Mones 
  ~
  Physics is like sex: sure, it may give some practical results, but 
  that's not why we do it.                            Richard Feynman

[signature.asc (application/pgp-signature, inline)]

Added tag(s) upstream and confirmed. Request was from Ricardo Mones <mones@debian.org> to 926705-submit@bugs.debian.org. (Tue, 09 Apr 2019 14:06:03 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 13:34:44 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.