First published: Fri Dec 22 2017(Updated: )
An issue was discovered in Enigmail before 1.9.9 that allows remote attackers to trigger use of an intended public key for encryption, because incorrect regular expressions are used for extraction of an e-mail address from a comma-separated list, as demonstrated by a modified Full Name field and a homograph attack, aka TBE-01-002.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/enigmail | 2:2.2.4-0.2~deb10u1 2:2.1.3+ds1-4~deb10u2 2:2.2.4-0.3 | |
Enigmail | <1.9.9 | |
Debian | =8.0 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17843 has a medium severity rating due to its potential for exploitation by remote attackers.
To fix CVE-2017-17843, upgrade to Enigmail version 1.9.9 or later.
Enigmail versions prior to 1.9.9 are affected by CVE-2017-17843.
Yes, CVE-2017-17843 can be exploited remotely if the conditions are met.
There is no specific workaround for CVE-2017-17843, and updating to a patched version is recommended.