FreeBSD : emacs -- enriched text remote code execution vulnerability (47e2e52c-975c-11e7-942d-5404a68a61a2)

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing one or more security-related

Description :

Paul Eggert reports :

Charles A. Roelli has found a security flaw in the enriched mode in
GNU Emacs.

When Emacs renders MIME text/enriched data (Internet RFC 1896), it is
vulnerable to arbitrary code execution. Since Emacs-based mail clients
decode 'Content-Type: text/enriched', this code is exploitable
remotely. This bug affects GNU Emacs versions 19.29 through 25.2.

See also :

Solution :

Update the affected packages.

Risk factor :


Family: FreeBSD Local Security Checks

Nessus Plugin ID: 103152 ()

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now