The signature verification routine in the Airmail GPG-PGP Plugin, versions 1.0 (9) and earlier, does not verify the status of the signature at all, which allows remote attackers to spoof arbitrary email signatures by crafting a signed email with an invalid signature. Also, it does not verify the validity of the signing key, which allows remote attackers to spoof arbitrary email signatures by crafting a key with a fake user ID (email address) and injecting it into the user's keyring.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2019-05-16T16:02:46
Updated: 2024-08-04T21:17:31.096Z
Reserved: 2019-02-15T00:00:00
Link: CVE-2019-8338
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2019-05-16T17:29:01.340
Modified: 2019-05-21T14:07:01.337
Link: CVE-2019-8338
Redhat
No data.