bug-gnu-emacs
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

bug#28350: [oss-security] GNU Emacs 25.2 enriched text remote code execu


From: Salvatore Bonaccorso
Subject: bug#28350: [oss-security] GNU Emacs 25.2 enriched text remote code execution
Date: Thu, 14 Sep 2017 19:21:40 +0200
User-agent: NeoMutt/20170609 (1.8.3)

Hi

On Tue, Sep 12, 2017 at 07:22:51AM +0200, Salvatore Bonaccorso wrote:
> Hi
> 
> On Mon, Sep 11, 2017 at 08:58:57PM +0200, Salvatore Bonaccorso wrote:
> > Hi Paul,
> > 
> > On Sun, Sep 10, 2017 at 11:56:20PM -0700, Paul Eggert wrote:
> > > GNU Emacs is an extensible, customizable, free/libre text editor and
> > > software environment.  When Emacs renders MIME text/enriched data 
> > > (Internet
> > > RFC 1896), it is vulnerable to arbitrary code execution. Since Emacs-based
> > > mail clients decode "Content-Type: text/enriched", this code is 
> > > exploitable
> > > remotely. This bug affects GNU Emacs versions 19.29 through 25.2.
> > > 
> > > Although we know no efforts to exploit this in the wild, exploitation is 
> > > easy.
> > [...]
> > > == Timeline ==
> > > 
> > > 2017-09-04. Bug reported to the Emacs bug tracker by Charles A. Roelli.
> > > 
> > > 2017-09-07. POC for remote code execution sent to the maintainers of Emacs
> > > and Gnus (Reiner Steib <Reiner.Steib@gmx.de>, private mail).
> > > 
> > > 2017-09-08. Patch (by Lars Ingebrigtsen <larsi@gnus.org>) to disable the
> > > problematic code and mitigation (private mail).
> > > 
> > > 2017-09-09. Patch committed in main development repository.
> > 
> > Have you requested a CVE for this issue?
> 
> FTR, it seems this was submitted to DWF already as per:
> https://debbugs.gnu.org/cgi/bugreport.cgi?bug=28350#63

CVE-2017-14482 was assigned for this issue.

Regards,
Salvatore





reply via email to

[Prev in Thread] Current Thread [Next in Thread]