5
CVSSv2

CVE-2007-1264

Published: 06/03/2007 Updated: 16/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Enigmail 0.94.2 and previous versions does not properly use the --status-fd argument when invoking GnuPG, which prevents Enigmail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote malicious users to forge the contents of a message without detection.

Vulnerable Product Search on Vulmon Subscribe to Product

enigmail enigmail

Vendor Advisories

Debian Bug report logs - #415225 security issue in enigmail package <0943 (CVE-2007-1264) Package: enigmail; Maintainer for enigmail is Debian Mozilla Extension Maintainers <pkg-mozext-maintainers@listsaliothdebianorg>; Source for enigmail is src:enigmail (PTS, buildd, popcon) Reported by: Daniel Schröter <dschr ...

Exploits

source: wwwsecurityfocuscom/bid/22759/info KMail is prone to a vulnerability that may allow an attacker to add arbitrary content into a message without the end user knowing An attacker may be able to exploit this issue to add arbitrary content into a GnuPG signed and/or encrypted message This vulnerability is due to the weakness discu ...