Remote Code Execution in GNU Emacs by Exploiting Email Processing
CVE-2017-14482
8.8HIGH
Summary
GNU Emacs versions prior to 25.3 are susceptible to a vulnerability that enables remote attackers to execute arbitrary code. This arises from the unsafe handling of email content with the 'Content-Type: text/enriched' header, where specifically crafted inputs can lead to the execution of shell commands. Users are particularly at risk when they read malicious email messages or Usenet articles. Attackers can leverage the unsafe extensions within lisp/textmodes/enriched.el and Gnus support for inline MIME objects in lisp/gnus/mm-view.el to compromise the Emacs environment instantly.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved