CVE-2019-10732

In KDE KMail 5.2.3, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, they unknowingly leak the plaintext of the encrypted message part(s) back to the attacker.
References
Link Resource
https://bugs.kde.org/show_bug.cgi?id=404698 Exploit Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/06/msg00012.html Mailing List Third Party Advisory
https://bugs.kde.org/show_bug.cgi?id=404698 Exploit Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/06/msg00012.html Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:kde:kmail:5.2.3:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:19

Type Values Removed Values Added
References () https://bugs.kde.org/show_bug.cgi?id=404698 - Exploit, Issue Tracking, Third Party Advisory () https://bugs.kde.org/show_bug.cgi?id=404698 - Exploit, Issue Tracking, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2019/06/msg00012.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/06/msg00012.html - Mailing List, Third Party Advisory

Information

Published : 2019-04-07 15:29

Updated : 2024-11-21 04:19


NVD link : CVE-2019-10732

Mitre link : CVE-2019-10732

CVE.ORG link : CVE-2019-10732


JSON object : View

Products Affected

kde

  • kmail

debian

  • debian_linux
CWE
CWE-319

Cleartext Transmission of Sensitive Information