CVE-2017-17843

An issue was discovered in Enigmail before 1.9.9 that allows remote attackers to trigger use of an intended public key for encryption, because incorrect regular expressions are used for extraction of an e-mail address from a comma-separated list, as demonstrated by a modified Full Name field and a homograph attack, aka TBE-01-002.
Configurations

Configuration 1 (hide)

cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

07 Nov 2023, 02:41

Type Values Removed Values Added
References
  • {'url': 'https://www.mail-archive.com/enigmail-users@enigmail.net/msg04280.html', 'name': 'https://www.mail-archive.com/enigmail-users@enigmail.net/msg04280.html', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://www.mail-archive.com/enigmail-users%40enigmail.net/msg04280.html -

Information

Published : 2017-12-27 17:08

Updated : 2023-12-10 12:15


NVD link : CVE-2017-17843

Mitre link : CVE-2017-17843

CVE.ORG link : CVE-2017-17843


JSON object : View

Products Affected

enigmail

  • enigmail

debian

  • debian_linux