Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-17847
HistoryDec 27, 2017 - 12:00 a.m.

CVE-2017-17847

2017-12-2700:00:00
ubuntu.com
ubuntu.com
6

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.005 Low

EPSS

Percentile

76.1%

An issue was discovered in Enigmail before 1.9.9. Signature spoofing is
possible because the UI does not properly distinguish between an attachment
signature, and a signature that applies to the entire containing message,
aka TBE-01-021. This is demonstrated by an e-mail message with an
attachment that is a signed e-mail message in message/rfc822 format.

OSVersionArchitecturePackageVersionFilename
ubuntu17.10noarchenigmail< 2:1.9.9-0ubuntu0.17.10.1UNKNOWN
ubuntu14.04noarchenigmail< 2:1.9.9-0ubuntu0.14.04.1UNKNOWN
ubuntu16.04noarchenigmail< 2:1.9.9-0ubuntu0.16.04.1UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.005 Low

EPSS

Percentile

76.1%