First published: Fri Dec 22 2017(Updated: )
An issue was discovered in Enigmail before 1.9.9. A remote attacker can obtain cleartext content by sending an encrypted data block (that the attacker cannot directly decrypt) to a victim, and relying on the victim to automatically decrypt that block and then send it back to the attacker as quoted text, aka the TBE-01-005 "replay" issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/enigmail | 2:2.2.4-0.2~deb10u1 2:2.1.3+ds1-4~deb10u2 2:2.2.4-0.3 | |
Enigmail Enigmail | <1.9.9 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue in Enigmail is CVE-2017-17844.
The severity of CVE-2017-17844 is medium (CVSS score 6.5).
An attacker can exploit CVE-2017-17844 by sending an encrypted data block to a victim and relying on the victim to automatically decrypt and send it back as quoted text, allowing the attacker to obtain cleartext content.
Enigmail versions before 1.9.9 are affected by CVE-2017-17844.
To fix CVE-2017-17844, update Enigmail to version 1.9.9 or later.