First published: Fri Dec 23 2016(Updated: )
Through a malicious URL that contained a quote character it was possible to inject HTML code in KMail's plaintext viewer. Due to the parser used on the URL it was not possible to include the equal sign (=) or a space into the injected HTML, which greatly reduces the available HTML functionality. Although it is possible to include an HTML comment indicator to hide content.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
KDE KMail | <=4.4.0 | |
Debian | =8.0 | |
Fedora | =25 | |
SUSE Linux Enterprise Server | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-7966 is classified as a moderate security issue.
To resolve CVE-2016-7966, upgrade KMail to versions later than 4.4.0 or apply the appropriate patches provided for your affected distribution.
CVE-2016-7966 affects KMail versions up to and including 4.4.0.
Currently, there are no known workarounds for CVE-2016-7966; the recommended action is to update the software.
CVE-2016-7966 enables injection of limited HTML code through a malicious URL in KMail's plaintext viewer.