Secunia Security Advisory - Noam Rathaus has discovered a vulnerability in KMail, which can be exploited by malicious people to conduct spoofing attacks.
e49f31ef4249b30d8b2fefbfca92401a9efd85d3db38e657fc02f4b7c14068e4
----------------------------------------------------------------------
Want a new IT Security job?
Vacant positions at Secunia:
https://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
KDE KMail User Interface Spoofing Vulnerability
SECUNIA ADVISORY ID:
SA14925
VERIFY ADVISORY:
https://secunia.com/advisories/14925/
CRITICAL:
Less critical
IMPACT:
Spoofing
WHERE:
>From remote
SOFTWARE:
KDE 3.x
https://secunia.com/product/219/
DESCRIPTION:
Noam Rathaus has discovered a vulnerability in KMail, which can be
exploited by malicious people to conduct spoofing attacks.
The vulnerability is caused due to an error where HTML code can
overlay part of the user interface. This can e.g. be exploited to
trick a user into believing a specially crafted mail is signed and
coming from a trusted source.
Successful exploitation requires that the option "Prefer HTML to
plain text" is enabled (not default setting).
The vulnerability has been confirmed in KMail 1.7.1 on KDE 3.3.1. KDE
3.3.2 is reportedly also affected. Other versions may also be
affected.
SOLUTION:
Disable the "Prefer HTML to plain text" setting.
PROVIDED AND/OR DISCOVERED BY:
Noam Rathaus
ORIGINAL ADVISORY:
https://bugs.kde.org/show_bug.cgi?id=96020
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
https://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
https://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------