Gpg-pgp 1.0\(9\) Remote Code Execution Vulnerability

Summary

The signature verification routine in the Airmail GPG-PGP Plugin, versions 1.0 (9) and earlier, does not verify the status of the signature at all, which allows remote attackers to spoof arbitrary email signatures by crafting a signed email with an invalid signature. Also, it does not verify the validity of the signing key, which allows remote attackers to spoof arbitrary email signatures by crafting a key with a fake user ID (email address) and injecting it into the user’s keyring.

Credit:

The information has been provided by  Jens Müller.
The original article can be found at: http://seclists.org/fulldisclosure/2019/Apr/38


Details

Gpg-pgp is prone to a remote code-execution vulnerability.This allows a remote attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition. 

Vulnerable Systems:

  • Gpg-pgp 1.0\(9\)

CVE Information:
CVE-2019-8338

Disclosure Timeline:
Publish Date:05/16/2019