DEBIAN-CVE-2014-5369

Source
https://security-tracker.debian.org/tracker/CVE-2014-5369
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2014-5369.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2014-5369
Upstream
Published
2014-09-08T14:55:03Z
Modified
2025-09-19T06:22:52Z
Summary
[none]
Details

Enigmail 1.7.x before 1.7.2 sends emails in plaintext when encryption is enabled and only BCC recipients are specified, which allows remote attackers to obtain sensitive information by sniffing the network.

References

Affected packages

Debian:11 / enigmail

Package

Name
enigmail
Purl
pkg:deb/debian/enigmail?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.7.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}