CVE-2017-17847

NameCVE-2017-17847
DescriptionAn issue was discovered in Enigmail before 1.9.9. Signature spoofing is possible because the UI does not properly distinguish between an attachment signature, and a signature that applies to the entire containing message, aka TBE-01-021. This is demonstrated by an e-mail message with an attachment that is a signed e-mail message in message/rfc822 format.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1219-1, DSA-4070-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
enigmail (PTS)bullseye2:2.2.4-0.3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
enigmailsourcewheezy2:1.9.9-1~deb7u1DLA-1219-1
enigmailsourcejessie2:1.9.9-1~deb8u1DSA-4070-1
enigmailsourcestretch2:1.9.9-1~deb9u1DSA-4070-1
enigmailsource(unstable)2:1.9.9-1

Notes

https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf

Search for package or bug name: Reporting problems