Vulnerability Details : CVE-2005-3256
The key selection dialogue in Enigmail before 0.92.1 can incorrectly select a key with a user ID that does not have additional information, which allows parties with that key to decrypt the message.
Products affected by CVE-2005-3256
- cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-3256
0.45%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 75 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-3256
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2005-3256
-
http://www.vupen.com/english/advisories/2005/2158
Site en construction
-
http://www.novell.com/linux/security/advisories/2005_28_sr.html
404 Page Not Found | SUSE
-
http://www.securityfocus.com/bid/15155
-
https://usn.ubuntu.com/211-1/
404: Page not found | Ubuntu
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:226
Mandriva
-
http://www.cert.dfn.de/infoserv/dsb/dsb-2005-01.html
DFN.Security: Seite nicht gefunden!
-
http://www.debian.org/security/2005/dsa-889
[SECURITY] [DSA 889-1] New enigmail packages fix information disclosure
Jump to