CVE-2019-11755
Ubuntu Security Notice USN-4202-2
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A crafted S/MIME message consisting of an inner encryption layer and an outer SignedData layer was shown as having a valid digital signature, although the signer might have had no access to the contents of the encrypted message, and might have stripped a different signature from the encrypted message. Previous versions had only suppressed showing a digital signature for messages with an outer multipart/signed layer. This vulnerability affects Thunderbird < 68.1.1.
Un mensaje S/MIME diseñado que consta de una capa de cifrado interna y una capa SignedData externa se mostró con firma digital válida, aunque el firmante podría no haber tenido acceso al contenido del mensaje cifrado y podría haber eliminado una firma diferente del mensaje cifrado. Las versiones anteriores solo habían suprimido el despliegue de una firma digital para mensajes con una capa externa multiparte y firmada. Esta vulnerabilidad afecta a Thunderbird versiones anteriores a 68.1.1.
USN-4202-1 fixed vulnerabilities in Thunderbird. After upgrading, Thunderbird created a new profile for some users. This update fixes the problem. It was discovered that a specially crafted S/MIME message with an inner encryption layer could be displayed as having a valid signature in some circumstances, even if the signer had no access to the encrypted message. An attacker could potentially exploit this to spoof the message author. Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, bypass security restrictions, bypass same-origin restrictions, conduct cross-site scripting attacks, or execute arbitrary code. A heap overflow was discovered in the expat library in Thunderbird. If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit this to cause a denial of service, or execute arbitrary code.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-05-03 CVE Reserved
- 2019-09-27 CVE Published
- 2024-08-04 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-347: Improper Verification of Cryptographic Signature
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html | Mailing List |
|
https://seclists.org/bugtraq/2019/Nov/24 | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html | 2020-08-24 | |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html | 2020-08-24 | |
https://usn.ubuntu.com/4202-1 | 2020-08-24 | |
https://usn.ubuntu.com/4335-1 | 2020-08-24 | |
https://www.debian.org/security/2019/dsa-4571 | 2020-08-24 | |
https://www.mozilla.org/security/advisories/mfsa2019-32 | 2020-08-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mozilla Search vendor "Mozilla" | Thunderbird Search vendor "Mozilla" for product "Thunderbird" | < 68.1.1 Search vendor "Mozilla" for product "Thunderbird" and version " < 68.1.1" | - |
Affected
|