Bugzilla – Bug 1131883
VUL-1: CVE-2019-10734: trojita: attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email
Last modified: 2020-01-16 14:56:36 UTC
CVE-2019-10734 In KDE Trojita 0.7, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, they unknowingly leak the plaintext of the encrypted message part(s) back to the attacker. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10734 http://www.cvedetails.com/cve/CVE-2019-10734/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10734 https://bugs.kde.org/show_bug.cgi?id=404697
It is not clear which versions are affected. Additionally, there is no fix yet.
Since I didn't touch this thing for years I removed myself from maintainers... @security-team I suppose you should throw it on the kde team since it is part of the kde world.
This is automated batch bugzilla cleanup. The openSUSE 42.3 changed to end-of-life (EOL [1]) status. As such it is no longer maintained, which means that it will not receive any further security or bug fix updates. As a result we are closing this bug. If you can reproduce this bug against a currently maintained version of openSUSE (At this moment openSUSE Leap 15.1, 15.0 and Tumbleweed) please feel free to reopen this bug against that version (!you must update the "Version" component in the bug fields, do not just reopen please), or alternatively create a new ticket. Thank you for reporting this bug and we are sorry it could not be fixed during the lifetime of the release. [1] https://en.opensuse.org/Lifetime
unfixed in 15.0 and 15.1 ... fabian, does the kde team want to take over`?
(In reply to Marcus Meissner from comment #4) > unfixed in 15.0 and 15.1 ... fabian, does the kde team want to take over`? We can, but unless upstream provides some code we can't really do anything. I sent a ping to the upstream bug report.