CVE-2017-17848

NameCVE-2017-17848
DescriptionAn issue was discovered in Enigmail before 1.9.9. In a variant of CVE-2017-17847, signature spoofing is possible for multipart/related messages because a signed message part can be referenced with a cid: URI but not actually displayed. In other words, the entire containing message appears to be signed, but the recipient does not see any of the signed text.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1219-1, DSA-4070-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
enigmail (PTS)jessie (security), jessie2:1.9.9-1~deb8u1fixed
stretch2:2.0.8-5~deb9u1fixed
stretch (security)2:1.9.9-1~deb9u1fixed
buster2:2.0.10+ds1-1fixed
bullseye, sid2:2.0.12+ds1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
enigmailsource(unstable)2:1.9.9-1medium
enigmailsourcejessie2:1.9.9-1~deb8u1mediumDSA-4070-1
enigmailsourcestretch2:1.9.9-1~deb9u1mediumDSA-4070-1
enigmailsourcewheezy2:1.9.9-1~deb7u1mediumDLA-1219-1

Notes

https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf

Search for package or bug name: Reporting problems