CVE-2012-1103

emacs/notmuch-mua.el in Notmuch before 0.11.1, when using the Emacs interface, allows user-assisted remote attackers to read arbitrary files via crafted MML tags, which are not properly quoted in an email reply cna cause the files to be attached to the message.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:notmuchmail:notmuch:*:*:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.1:*:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.2:*:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.3:*:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.4:*:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.5:*:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.6:*:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.6:254:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.6:rc1:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.7:*:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.7:rc1:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.8:*:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.8:rc0:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.8:rc1:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.9:*:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.9:rc1:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.9:rc2:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.10:*:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.10:rc1:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.10:rc2:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.10.2:*:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.11:rc1:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.11:rc2:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.11:rc2-1:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.11:rc3:*:*:*:*:*:*
cpe:2.3:a:notmuchmail:notmuch:0.11:rc3-1:*:*:*:*:*:*
cpe:2.3:a:gnu:emacs:-:*:*:*:*:*:*:*

History

21 Nov 2024, 01:36

Type Values Removed Values Added
References () http://git.notmuchmail.org/git/notmuch/blobdiff/3f2050ac221a4c940c12442f156f12fff11600c6..ae438ccd8c77831158c7c30f19710d798ee4a6b4:/emacs/notmuch-mua.el - Exploit, Patch () http://git.notmuchmail.org/git/notmuch/blobdiff/3f2050ac221a4c940c12442f156f12fff11600c6..ae438ccd8c77831158c7c30f19710d798ee4a6b4:/emacs/notmuch-mua.el - Exploit, Patch
References () http://notmuchmail.org/news/release-0.11.1/ - Vendor Advisory () http://notmuchmail.org/news/release-0.11.1/ - Vendor Advisory
References () http://secunia.com/advisories/48139 - Vendor Advisory () http://secunia.com/advisories/48139 - Vendor Advisory
References () http://www.debian.org/security/2012/dsa-2416 - () http://www.debian.org/security/2012/dsa-2416 -
References () http://www.openwall.com/lists/oss-security/2012/03/04/5 - Exploit, Patch () http://www.openwall.com/lists/oss-security/2012/03/04/5 - Exploit, Patch
References () http://www.openwall.com/lists/oss-security/2012/03/05/6 - Exploit, Patch () http://www.openwall.com/lists/oss-security/2012/03/05/6 - Exploit, Patch
References () http://www.securityfocus.com/bid/52155 - () http://www.securityfocus.com/bid/52155 -

Information

Published : 2012-09-25 23:55

Updated : 2024-11-21 01:36


NVD link : CVE-2012-1103

Mitre link : CVE-2012-1103

CVE.ORG link : CVE-2012-1103


JSON object : View

Products Affected

notmuchmail

  • notmuch

gnu

  • emacs
CWE
CWE-20

Improper Input Validation