Ubuntu 4.10 / 5.04 / 5.10 : enigmail vulnerability (USN-211-1)

Medium Nessus Plugin ID 20629


The remote Ubuntu host is missing one or more security-related patches.


Hadmut Danish discovered an information disclosure vulnerability in the key selection dialog of the Mozilla/Thunderbird enigmail plugin.
If a user's keyring contained a key with an empty user id (i. e. a key without a name and email address), this key was selected by default when the user attempted to send an encrypted email. Unless this empty key was manually deselected, the message got encrypted for that empty key, whose owner could then decrypt it.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected mozilla-enigmail and / or mozilla-thunderbird-enigmail packages.

Plugin Details

Severity: Medium

ID: 20629

File Name: ubuntu_USN-211-1.nasl

Version: $Revision: 1.12 $

Type: local

Agent: unix

Published: 2006/01/15

Modified: 2016/05/26

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:mozilla-enigmail, p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-enigmail, cpe:/o:canonical:ubuntu_linux:4.10, cpe:/o:canonical:ubuntu_linux:5.04, cpe:/o:canonical:ubuntu_linux:5.10

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Patch Publication Date: 2005/10/20

Reference Information

CVE: CVE-2005-3256

USN: 211-1