oss-sec mailing list archives
Spoofing OpenPGP and S/MIME Signatures in Emails (multiple clients)
From: Marcus Brinkmann <marcus.brinkmann () ruhr-uni-bochum de>
Date: Tue, 30 Apr 2019 14:03:26 +0200
We demonstrate how an attacker can spoof email signatures in 70% of the tested clients, including Thunderbird, Outlook with GpgOL, KMail, Evolution, Trojitá, Apple Mail with GPGTools, Airmail, K-9 Mail, Roundcube and Mailpile. Title: "Johnny, you are fired! – Spoofing OpenPGP and S/MIME Signatures in Emails" To appear at USENIX Security '19. Joint work with Jens Müller, Marcus Brinkmann, Damian Poddebniak, Hanno Böck, Sebastian Schinzel, Juraj Somorovsky, Jörg Schwenk. PDF: https://github.com/RUB-NDS/Johnny-You-Are-Fired/raw/master/paper/johnny-fired.pdf Artifacts: https://github.com/RUB-NDS/Johnny-You-Are-Fired Tracking numbers: CVE-2018-18509, CVE-2018-12019, CVE-2018-12020, CVE-2017-17848, CVE-2018-15586, CVE-2018-15587, CVE-2018-15588, CVE-2019-8338, CVE-2018-12356, CVE-2018-12556, CVE-2019-728 Thanks! Marcus -- Dipl.-Math. Marcus Brinkmann Lehrstuhl für Netz- und Datensicherheit Ruhr Universität Bochum Universitätsstr. 150, Geb. ID 2/461 D-44780 Bochum Telefon: +49 (0) 234 / 32-25030 http://www.nds.rub.de/chair/people/mbrinkmann
Current thread:
- Spoofing OpenPGP and S/MIME Signatures in Emails (multiple clients) Marcus Brinkmann (Apr 30)