CVE-2017-17844

NameCVE-2017-17844
DescriptionAn issue was discovered in Enigmail before 1.9.9. A remote attacker can obtain cleartext content by sending an encrypted data block (that the attacker cannot directly decrypt) to a victim, and relying on the victim to automatically decrypt that block and then send it back to the attacker as quoted text, aka the TBE-01-005 "replay" issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1219-1, DSA-4070-1
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
enigmail (PTS)jessie (security), jessie2:1.9.9-1~deb8u1fixed
stretch2:2.0.8-5~deb9u1fixed
stretch (security)2:1.9.9-1~deb9u1fixed
buster2:2.0.12+ds1-1~deb10u1fixed
buster (security)2:2.1.3+ds1-4~deb10u2fixed
bullseye2:2.0.12+ds1-1fixed
sid2:2.1.3+ds1-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
enigmailsource(unstable)2:1.9.9-1
enigmailsourcejessie2:1.9.9-1~deb8u1DSA-4070-1
enigmailsourcestretch2:1.9.9-1~deb9u1DSA-4070-1
enigmailsourcewheezy2:1.9.9-1~deb7u1DLA-1219-1

Notes

https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf

Search for package or bug name: Reporting problems