CVE-2017-17843
Publication date 27 December 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
An issue was discovered in Enigmail before 1.9.9 that allows remote attackers to trigger use of an intended public key for encryption, because incorrect regular expressions are used for extraction of an e-mail address from a comma-separated list, as demonstrated by a modified Full Name field and a homograph attack, aka TBE-01-002.
Status
Package | Ubuntu Release | Status |
---|---|---|
enigmail | ||
16.04 LTS xenial |
Fixed 2:1.9.9-0ubuntu0.16.04.1
|
|
14.04 LTS trusty |
Fixed 2:1.9.9-0ubuntu0.14.04.1
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 · Medium |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |
References
Other references
- https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf
- https://lists.debian.org/debian-security-announce/2017/msg00333.html
- https://www.debian.org/security/2017/dsa-4070
- https://www.mail-archive.com/[email protected]/msg04280.html
- https://www.cve.org/CVERecord?id=CVE-2017-17843