CVE-2017-17847

NameCVE-2017-17847
DescriptionAn issue was discovered in Enigmail before 1.9.9. Signature spoofing is possible because the UI does not properly distinguish between an attachment signature, and a signature that applies to the entire containing message, aka TBE-01-021. This is demonstrated by an e-mail message with an attachment that is a signed e-mail message in message/rfc822 format.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1219-1, DSA-4070-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
enigmail (PTS)wheezy2:1.8.2-4~deb7u1vulnerable
wheezy (security)2:1.9.9-1~deb7u1fixed
jessie2:1.9.8.1-1~deb8u1vulnerable
jessie (security)2:1.9.9-1~deb8u1fixed
stretch (security), stretch2:1.9.9-1~deb9u1fixed
buster, sid2:1.9.9-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
enigmailsource(unstable)2:1.9.9-1medium
enigmailsourcejessie2:1.9.9-1~deb8u1mediumDSA-4070-1
enigmailsourcestretch2:1.9.9-1~deb9u1mediumDSA-4070-1
enigmailsourcewheezy2:1.9.9-1~deb7u1mediumDLA-1219-1

Notes

https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf

Search for package or bug name: Reporting problems