vulnerability
FreeBSD: VID-47E2E52C-975C-11E7-942D-5404A68A61A2: emacs -- enriched text remote code execution vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Sep 4, 2017 | Sep 12, 2017 | Feb 19, 2025 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Sep 4, 2017
Added
Sep 12, 2017
Modified
Feb 19, 2025
Description
Paul Eggert reports:
Charles A. Roelli has found a security flaw in the enriched mode in GNU Emacs.
When Emacs renders MIME text/enriched data (Internet RFC 1896), it
is vulnerable to arbitrary code execution. Since Emacs-based mail
clients decode "Content-Type: text/enriched", this code is exploitable
remotely. This bug affects GNU Emacs versions 19.29 through 25.2.
Solution(s)
freebsd-upgrade-package-emacs-develfreebsd-upgrade-package-emacs-nox11freebsd-upgrade-package-emacs25
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.