vulnerability
FreeBSD: VID-47e2e52c-975c-11e7-942d-5404a68a61a2: emacs -- enriched text remote code execution vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Sep 12, 2017 | Sep 12, 2017 | Dec 10, 2025 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Sep 12, 2017
Added
Sep 12, 2017
Modified
Dec 10, 2025
Description
Paul Eggert reports: Charles A. Roelli has found a security flaw in the enriched mode in GNU Emacs. When Emacs renders MIME text/enriched data (Internet RFC 1896), it is vulnerable to arbitrary code execution. Since Emacs-based mail clients decode "Content-Type: text/enriched", this code is exploitable remotely. This bug affects GNU Emacs versions 19.29 through 25.2.
Solutions
freebsd-upgrade-package-emacs25freebsd-upgrade-package-emacs-nox11freebsd-upgrade-package-emacs-devel
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.