CVE-2017-17848

NameCVE-2017-17848
DescriptionAn issue was discovered in Enigmail before 1.9.9. In a variant of CVE-2017-17847, signature spoofing is possible for multipart/related messages because a signed message part can be referenced with a cid: URI but not actually displayed. In other words, the entire containing message appears to be signed, but the recipient does not see any of the signed text.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1219-1, DSA-4070-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
enigmail (PTS)buster2:2.2.4-0.2~deb10u1fixed
buster (security)2:2.1.3+ds1-4~deb10u2fixed
sid, bullseye2:2.2.4-0.3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
enigmailsourcewheezy2:1.9.9-1~deb7u1DLA-1219-1
enigmailsourcejessie2:1.9.9-1~deb8u1DSA-4070-1
enigmailsourcestretch2:1.9.9-1~deb9u1DSA-4070-1
enigmailsource(unstable)2:1.9.9-1

Notes

https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf

Search for package or bug name: Reporting problems