Ubuntu 4.10 / 5.04 / 5.10 : enigmail vulnerability (USN-211-1)

Medium Nessus Plugin ID 20629

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 3.4


The remote Ubuntu host is missing one or more security-related patches.


Hadmut Danish discovered an information disclosure vulnerability in the key selection dialog of the Mozilla/Thunderbird enigmail plugin.
If a user's keyring contained a key with an empty user id (i. e. a key without a name and email address), this key was selected by default when the user attempted to send an encrypted email. Unless this empty key was manually deselected, the message got encrypted for that empty key, whose owner could then decrypt it.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected mozilla-enigmail and / or mozilla-thunderbird-enigmail packages.

Plugin Details

Severity: Medium

ID: 20629

File Name: ubuntu_USN-211-1.nasl

Version: 1.14

Type: local

Agent: unix

Published: 2006/01/15

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: Medium

VPR Score: 3.4

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:mozilla-enigmail, p-cpe:/a:canonical:ubuntu_linux:mozilla-thunderbird-enigmail, cpe:/o:canonical:ubuntu_linux:4.10, cpe:/o:canonical:ubuntu_linux:5.04, cpe:/o:canonical:ubuntu_linux:5.10

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Patch Publication Date: 2005/10/20

Reference Information

CVE: CVE-2005-3256

USN: 211-1