dDecrypted S/MIME parts hidden with CSS or the plaintext HTML tag can leak plaintext when included in a HTML reply/forward. This vulnerability affects Thunderbird < 52.9.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla thunderbird |
||
redhat enterprise linux 6.0 |
||
redhat enterprise linux desktop 6.0 |
||
redhat enterprise linux workstation 6.0 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux desktop 7.0 |
||
redhat enterprise linux server 7.0 |
||
redhat enterprise linux 7.6 |
||
redhat enterprise linux 7.5 |
||
redhat enterprise linux 7.0 |
||
redhat enterprise linux workstation 7.0 |
||
debian debian linux 9.0 |
||
debian debian linux 8.0 |
||
canonical ubuntu linux 14.04 |
||
canonical ubuntu linux 16.04 |
||
canonical ubuntu linux 17.10 |
||
canonical ubuntu linux 18.04 |
Version 52.9 now does PGP and S/MIME right, adds another dozen bug-splats
Thunderbird has pushed code with fixes for a dozen security vulnerabilities – including the EFAIL encryption mess that emerged in May. The EFAIL-specific fixes address two errors in Thunderbird's handling of encrypted messages: CVE-2018-12372, in which an attacker can build S/MIME and PGP decryption oracles in HTML messages; and CVE-2018-12373, in which S/MIME plaintext can be leaked if a message is forwarded. EFAIL was announced with a much-criticised process. The discoverers emphasised the i...