CVE-2017-14482

Severity
8.8HIGH
EPSS
4.6%
top 10.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 14
Latest updateMay 13

Description

GNU Emacs before 25.3 allows remote attackers to execute arbitrary code via email with crafted "Content-Type: text/enriched" data containing an x-display XML element that specifies execution of shell commands, related to an unsafe text/enriched extension in lisp/textmodes/enriched.el, and unsafe Gnus support for enriched and richtext inline MIME objects in lisp/gnus/mm-view.el. In particular, an Emacs user can be instantly compromised by reading a crafted email message (or Usenet news article).

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

Ubuntuemacs24< 24.3+1-2ubuntu1.1+1
NVDgnu/emacs25.2

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-2v7h-5r83-vh8r: GNU Emacs before 252022-05-13
CVEList
CVE-2017-14482: GNU Emacs before 252017-09-14
OSV
CVE-2017-14482: GNU Emacs before 252017-09-14

📋Vendor Advisories

3
Ubuntu
Emacs vulnerability2017-09-21
Ubuntu
Emacs vulnerability2017-09-21
Red Hat
emacs: command injection flaw within "enriched mode" handling2017-09-04

💬Community

2
Bugzilla
CVE-2017-14482 emacs: Unsafe enriched mode translations [fedora-all]2017-09-11
Bugzilla
CVE-2017-14482 emacs: command injection flaw within "enriched mode" handling2017-09-11
CVE-2017-14482 (HIGH CVSS 8.8) | GNU Emacs before 25.3 allows remote | cvebase.io