OpenPGP & S/MIME Mail Client Vulnerabilities
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Threat details
The first vulnerability describes how an intentionally misconfigured HTML object can be used to obtain decrypted messages. The example the researchers give encloses the encrypted text within an HTML image tag. When this email is received and decrypted by an affected mail client it will send a URL requesting the image file to the sender; as the HTML tag enclosed the text this URL contains the decrypted text, at which point the sender has access to it.
The second two vulnerabilities describe how specific cryptographic attacks can be used to identify where to inject tags in order to exploit the first vulnerability.
For further information
Remediation steps
CVE Vulnerabilities
Last edited: 17 February 2020 12:51 pm