Search for vulnerabilities
Vulnerability ID | VCID-2abg-xpq1-aaap |
Aliases |
CVE-2019-10732
|
Summary | In KDE KMail 5.2.3, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, they unknowingly leak the plaintext of the encrypted message part(s) back to the attacker. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 3.9 |
Risk | 1.9 |
Affected and Fixed Packages | Package Details |
Reference id | Reference type | URL |
---|---|---|
https://api.first.org/data/v1/epss?cve=CVE-2019-10732 | ||
https://bugs.kde.org/show_bug.cgi?id=404698 | ||
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10732 | ||
https://lists.debian.org/debian-lts-announce/2019/06/msg00012.html | ||
926996 | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926996 | |
cpe:2.3:a:kde:kmail:5.2.3:*:*:*:*:*:*:* | https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kmail:5.2.3:*:*:*:*:*:*:* | |
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | |
CVE-2019-10732 | https://nvd.nist.gov/vuln/detail/CVE-2019-10732 |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Percentile | 0.44389 |
EPSS Score | 0.00107 |
Published At | Nov. 1, 2024, midnight |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |