CVE-2009-0547
evolution-data-server: S/MIME signatures are considered to be valid even for modified messages (MITM)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Evolution 2.22.3.1 checks S/MIME signatures against a copy of the e-mail text within a signed-data blob, not the copy of the e-mail text displayed to the user, which allows remote attackers to spoof a signature by modifying the latter copy, a different vulnerability than CVE-2008-5077.
Evolution v2.22.3.1, comprueba las firmas S/MIME contra una copia del texto del correo electrónico con un campo de datos firmados, la copia del texto del correo no se muestra al usuario, esto permite a atacantes remotos falsificar la firma modificando la copia posterior. Se trata de una vulnerabilidad diferente de CVE-2008-5077.
A wrong handling of signed Secure/Multipurpose Internet Mail Extensions (S/MIME) e-mail messages enables attackers to spoof its signatures by modifying the latter copy. Crafted authentication challange packets (NT Lan Manager type 2) sent by a malicious remote mail server enables remote attackers either to cause denial of service and to read information from the process memory of the client. Multiple integer overflows in Base64 encoding functions enables attackers either to cause denial of service and to execute arbitrary code. This update provides fixes for those vulnerabilities. evolution-data-server packages from Mandriva Linux distributions 2008.1 and 2009.0 are not affected by CVE-2009-0587.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-02-12 CVE Reserved
- 2009-02-12 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-310: Cryptographic Issues
CAPEC
References (23)
URL | Tag | Source |
---|---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508479 | X_refsource_misc | |
http://bugzilla.gnome.org/show_bug.cgi?id=564465 | X_refsource_confirm | |
http://openwall.com/lists/oss-security/2009/02/10/7 | Mailing List | |
http://secunia.com/advisories/34338 | Third Party Advisory | |
http://secunia.com/advisories/34339 | Third Party Advisory | |
http://secunia.com/advisories/34363 | Third Party Advisory | |
http://secunia.com/advisories/35357 | Third Party Advisory | |
http://secunia.com/advisories/38915 | Third Party Advisory | |
http://www.securityfocus.com/bid/33720 | Vdb Entry | |
http://www.vupen.com/english/advisories/2010/1107 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9619 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Evolution Search vendor "Evolution" | Evolution Search vendor "Evolution" for product "Evolution" | 2.22.3.1 Search vendor "Evolution" for product "Evolution" and version "2.22.3.1" | - |
Affected
|