Arbitrary Command Injection Affecting emacs package, versions [,25.3)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
3.11% (91st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-EMACS-2370933
  • published26 Jan 2022
  • disclosed14 Sept 2017
  • creditUnknown

Introduced: 14 Sep 2017

CVE-2017-14482  (opens in a new tab)
CWE-77  (opens in a new tab)

How to fix?

Upgrade emacs to version 25.3 or higher.

Overview

Affected versions of this package are vulnerable to Arbitrary Command Injection. GNU Emacs before 25.3 allows remote attackers to execute arbitrary code via email with crafted "Content-Type: text/enriched" data containing an x-display XML element that specifies execution of shell commands, related to an unsafe text/enriched extension in lisp/textmodes/enriched.el, and unsafe Gnus support for enriched and richtext inline MIME objects in lisp/gnus/mm-view.el. In particular, an Emacs user can be instantly compromised by reading a crafted email message (or Usenet news article).

References

CVSS Scores

version 3.1