FreeBSD : emacs -- enriched text remote code execution vulnerability (47e2e52c-975c-11e7-942d-5404a68a61a2)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Paul Eggert reports :

Charles A. Roelli has found a security flaw in the enriched mode in
GNU Emacs.

When Emacs renders MIME text/enriched data (Internet RFC 1896), it is
vulnerable to arbitrary code execution. Since Emacs-based mail clients
decode 'Content-Type: text/enriched', this code is exploitable
remotely. This bug affects GNU Emacs versions 19.29 through 25.2.

See also :

http://seclists.org/oss-sec/2017/q3/422
https://bugs.gnu.org/28350
http://www.nessus.org/u?cdf9a0f6

Solution :

Update the affected packages.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 103152 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now