First published: Fri Dec 22 2017(Updated: )
An issue was discovered in Enigmail before 1.9.9. Regular expressions are exploitable for Denial of Service, because of attempts to match arbitrarily long strings, aka TBE-01-003.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/enigmail | 2:2.2.4-0.2~deb10u1 2:2.1.3+ds1-4~deb10u2 2:2.2.4-0.3 | |
Enigmail Enigmail | <1.9.9 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2017-17846.
The severity level of CVE-2017-17846 is high, with a value of 7.5.
CVE-2017-17846 can be exploited for Denial of Service attacks due to regular expressions attempts to match arbitrarily long strings.
The affected software versions are Enigmail before 1.9.9 and Debian Linux versions 8.0 and 9.0.
To fix CVE-2017-17846, you should update Enigmail to version 1.9.9 or above, or update your Debian Linux to a fixed version.