ID CVE-2017-14482
Summary GNU Emacs before 25.3 allows remote attackers to execute arbitrary code via email with crafted "Content-Type: text/enriched" data containing an x-display XML element that specifies execution of shell commands, related to an unsafe text/enriched extension in lisp/textmodes/enriched.el, and unsafe Gnus support for enriched and richtext inline MIME objects in lisp/gnus/mm-view.el. In particular, an Emacs user can be instantly compromised by reading a crafted email message (or Usenet news article).
References
Vulnerable Configurations
  • cpe:2.3:a:gnu:emacs:-:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:-:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:20.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:20.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:20.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:20.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:20.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:20.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:20.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:20.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:20.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:20.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:20.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:20.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:20.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:20.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:20.7:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:20.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:21:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:21:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:21.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:21.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:21.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:21.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:21.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:21.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:21.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:21.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:21.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:21.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:21.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:21.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:22.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:22.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:22.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:22.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:22.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:22.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:23.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:23.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:23.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:23.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:23.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:23.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:23.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:23.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:24.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:24.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:24.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:24.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:24.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:24.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:emacs:24.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:emacs:24.4:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 03-10-2019 - 00:03)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
redhat via4
advisories
bugzilla
id 1490409
title handling
oval
AND
  • OR
    • comment Red Hat Enterprise Linux 7 Client is installed
      oval oval:com.redhat.rhba:tst:20150364001
    • comment Red Hat Enterprise Linux 7 Server is installed
      oval oval:com.redhat.rhba:tst:20150364002
    • comment Red Hat Enterprise Linux 7 Workstation is installed
      oval oval:com.redhat.rhba:tst:20150364003
    • comment Red Hat Enterprise Linux 7 ComputeNode is installed
      oval oval:com.redhat.rhba:tst:20150364004
  • OR
    • AND
      • comment emacs is earlier than 1:24.3-20.el7_4
        oval oval:com.redhat.rhsa:tst:20172771009
      • comment emacs is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20172771010
    • AND
      • comment emacs-common is earlier than 1:24.3-20.el7_4
        oval oval:com.redhat.rhsa:tst:20172771005
      • comment emacs-common is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20172771006
    • AND
      • comment emacs-el is earlier than 1:24.3-20.el7_4
        oval oval:com.redhat.rhsa:tst:20172771011
      • comment emacs-el is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20172771012
    • AND
      • comment emacs-filesystem is earlier than 1:24.3-20.el7_4
        oval oval:com.redhat.rhsa:tst:20172771015
      • comment emacs-filesystem is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20172771016
    • AND
      • comment emacs-nox is earlier than 1:24.3-20.el7_4
        oval oval:com.redhat.rhsa:tst:20172771007
      • comment emacs-nox is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20172771008
    • AND
      • comment emacs-terminal is earlier than 1:24.3-20.el7_4
        oval oval:com.redhat.rhsa:tst:20172771013
      • comment emacs-terminal is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20172771014
rhsa
id RHSA-2017:2771
released 2017-09-19
severity Important
title RHSA-2017:2771: emacs security update (Important)
rpms
  • emacs-1:24.3-20.el7_4
  • emacs-common-1:24.3-20.el7_4
  • emacs-el-1:24.3-20.el7_4
  • emacs-filesystem-1:24.3-20.el7_4
  • emacs-nox-1:24.3-20.el7_4
  • emacs-terminal-1:24.3-20.el7_4
refmap via4
confirm
debian
  • DSA-3970
  • DSA-3975
gentoo GLSA-201801-07
Last major update 03-10-2019 - 00:03
Published 14-09-2017 - 16:29
Back to Top