[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#898634: kmail: efail attack against S/MIME



Hey,

For S/MIME the situation is that it is a conceptional weakness in the standard 
to remove the target vector completely.

In KMail we have the best handling that we can get at the moment (with default 
settings). KMail never access resources from the internet without asking the 
user or an explicit change of the default setting:
Settings > Configure KMail > Security > Reading > Allow messages to load 
external references from the Internet

There are some small patches, that disable this setting for encrypted 
messages, to enforce a user interaction:

https://phabricator.kde.org/D12391
https://phabricator.kde.org/D12393
https://phabricator.kde.org/D12394

For me applying the patches makes sense to improve security for users, but 
disabling the external resource loading completely would break workflows. 
Those patches are applied for the following Debian packages, where the setting 
is used for everything:
libmessageviewer5  << 4:18.04.1
kmail < 4:18.04.1

As already mentioned, the underlying problem is the S/MIME conceptional 
weaknes, that can't be fixed by those patches.

The stack KMail is using for decryption is GPGME Qt backend that is packaged 
in gpgme1.0 for testing/sid and gpgmepp for stable and older.

I'm not sure, how this should be handled in Debian correctly.

For a more detailed look for KMail and EFail see the dot.kde article:

https://dot.kde.org/2018/05/15/efail-and-kmail

hefee

--
On Montag, 14. Mai 2018 15:33:02 CEST Yves-Alexis Perez wrote:
> Source: kmail
> Severity: grave
> Tags: security
> Justification: user security hole
> 
> Hi,
> 
> as you may already know, a paper was published this morning describing a
> vulnerability known as efail against S/MIME and PGP/MIME implementations
> in various mail clients.
> 
> This vulnerability allows an attacker with read/write access to
> encrypted mail to retrieve the plaintext provided HTML mails are
> enabled, as well as loading of remote content.
> 
> The paper indicates that the PGP/MIME implementation in kmail is not
> vulnerable, but the S/MIME is.
> 
> It might be possible that the vulnerability is in an underlying library,
> so feel free to reassign if needed.
> 
> It's likely we'll have to issue a DSA for this.
> 
> Regards,

Attachment: signature.asc
Description: This is a digitally signed message part.


Reply to: