RHEL 7 : emacs (RHSA-2017:2771)

Medium Nessus Plugin ID 103352


The remote Red Hat host is missing one or more security updates.


An update for emacs is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

GNU Emacs is a powerful, customizable, self-documenting text editor.
It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.

Security Fix(es) :

* A command injection flaw within the Emacs 'enriched mode' handling has been discovered. By tricking an unsuspecting user into opening a specially crafted file using Emacs, a remote attacker could exploit this flaw to execute arbitrary commands with the privileges of the Emacs user. (CVE-2017-14482)


Update the affected packages.

See Also



Plugin Details

Severity: Medium

ID: 103352

File Name: redhat-RHSA-2017-2771.nasl

Version: $Revision: 3.5 $

Type: local

Agent: unix

Published: 2017/09/20

Modified: 2018/03/01

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:emacs, p-cpe:/a:redhat:enterprise_linux:emacs-common, p-cpe:/a:redhat:enterprise_linux:emacs-debuginfo, p-cpe:/a:redhat:enterprise_linux:emacs-el, p-cpe:/a:redhat:enterprise_linux:emacs-filesystem, p-cpe:/a:redhat:enterprise_linux:emacs-nox, p-cpe:/a:redhat:enterprise_linux:emacs-terminal, cpe:/o:redhat:enterprise_linux:7, cpe:/o:redhat:enterprise_linux:7.4

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/09/19

Exploitable With


Reference Information

CVE: CVE-2017-14482

OSVDB: 165174

RHSA: 2017:2771