Vulnerability Details : CVE-2013-4166
The gpg_ctx_add_recipient function in camel/camel-gpg-context.c in GNOME Evolution 3.8.4 and earlier and Evolution Data Server 3.9.5 and earlier does not properly select the GPG key to use for email encryption, which might cause the email to be encrypted with the wrong key and allow remote attackers to obtain sensitive information.
Vulnerability category: Information leak
Products affected by CVE-2013-4166
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:evolution:*:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:evolution_data_server:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-4166
0.38%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-4166
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2013-4166
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-4166
-
https://git.gnome.org/browse/evolution-data-server/commit/?id=5d8b92c622f6927b253762ff9310479dd3ac627d
CamelGpgContext: Enclose email addresses in brackets. (5d8b92c6) · Commits · GNOME / evolution-data-server · GitLabPatch;Vendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-1540.html
RHSA-2013:1540 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://git.gnome.org/browse/evolution-data-server/commit/?h=gnome-3-8&id=f7059bb37dcce485d36d769142ec9515708d8ae5
CamelGpgContext: Enclose email addresses in brackets. (f7059bb3) · Commits · GNOME / evolution-data-server · GitLabPatch;Vendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=973728
973728 – (CVE-2013-4166) CVE-2013-4166 evolution: incorrect selection of recipient gpg public key for encrypted mailIssue Tracking;Third Party Advisory
-
http://seclists.org/oss-sec/2013/q3/191
oss-sec: Re: CVE Request: evolution mail client GPG key selection issueMailing List;Third Party Advisory
Jump to