KMail 1.9.5 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents KMail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.
Max CVSS
7.8
EPSS Score
5.62%
Published
2007-03-06
Updated
2018-10-16
Kmail 1.2 on KDE 2.1.1 allows remote attackers to cause a denial of service (crash) via an email message whose body is approximately 55 K long.
Max CVSS
5.0
EPSS Score
0.56%
Published
2002-06-25
Updated
2016-10-18
Buffer overflow in KDE Kmail allows a remote attacker to cause a denial of service via an attachment with a long file name.
Max CVSS
5.0
EPSS Score
0.84%
Published
1999-06-01
Updated
2017-10-10
KDE K-Mail allows local users to gain privileges via a symlink attack in temporary user directories.
Max CVSS
4.6
EPSS Score
0.04%
Published
2000-01-04
Updated
2008-09-09
4 vulnerabilities found