4.3
MEDIUM

CVE-2018-15587

Published: 11/02/2019 Updated: 12/02/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8

Vulnerability Summary

GNOME Evolution OpenPGP Signature Spoofing Vulnerability

GNOME Evolution through 3.28.2 is prone to OpenPGP signatures being spoofed for arbitrary messages using a specially crafted email that contains a valid signature from the entity to be impersonated as an attachment.

A vulnerability in GNOME Evolution could allow an unauthenticated, remote attacker to conduct spoofing attacks on a targeted system. The vulnerability exists because the affected software does not properly validate OpenPGP signatures sent to an affected system. An attacker could exploit this vulnerability by persuading a user to open a malicious email with valid PGP-signed data as an attachment. A successful exploit could allow the attacker to either inject arbitrary script code, which could be used to trick the user into disclosing sensitive information, or conduct further attacks. Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available. GNOME has confirmed the vulnerability and released software updates.

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Access Complexity: MEDIUM
Authentication: NONE
Access Vector: NETWORK
Confidentiality Impact: NONE
Integrity Impact: PARTIAL
Availability Impact: NONE

Vulnerability Trend

Affected Products

Vendor Product Versions
GnomeEvolution3.28.2

Vendor Advisories

GNOME Evolution through 3282 is prone to OpenPGP signatures being spoofed for arbitrary messages using a specially crafted email that contains a valid signature from the entity to be impersonated as an attachment ...

References