Description
An issue was discovered in Enigmail before 1.9.9 that allows remote attackers to trigger use of an intended public key for encryption, because incorrect regular expressions are used for extraction of an e-mail address from a comma-separated list, as demonstrated by a modified Full Name field and a homograph attack, aka TBE-01-002.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1219-1 | enigmail security update |
EUVD |
EUVD-2017-8990 | An issue was discovered in Enigmail before 1.9.9 that allows remote attackers to trigger use of an intended public key for encryption, because incorrect regular expressions are used for extraction of an e-mail address from a comma-separated list, as demonstrated by a modified Full Name field and a homograph attack, aka TBE-01-002. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T21:06:48.850Z
Reserved: 2017-12-22T00:00:00.000Z
Link: CVE-2017-17843
No data.
Status : Modified
Published: 2017-12-27T17:08:19.670
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-17843
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD