GNU Emacs before 25.3 allows remote attackers to execute arbitrary code via email with crafted "Content-Type: text/enriched" data containing an x-display XML element that specifies execution of shell commands, related to an unsafe text/enriched extension in lisp/textmodes/enriched.el, and unsafe Gnus support for enriched and richtext inline MIME objects in lisp/gnus/mm-view.el. In particular, an Emacs user can be instantly compromised by reading a crafted email message (or Usenet news article).
{ "binaries": [ { "binary_version": "24.3+1-2ubuntu1.1", "binary_name": "emacs24" }, { "binary_version": "24.3+1-2ubuntu1.1", "binary_name": "emacs24-bin-common" }, { "binary_version": "24.3+1-2ubuntu1.1", "binary_name": "emacs24-common" }, { "binary_version": "24.3+1-2ubuntu1.1", "binary_name": "emacs24-el" }, { "binary_version": "24.3+1-2ubuntu1.1", "binary_name": "emacs24-lucid" }, { "binary_version": "24.3+1-2ubuntu1.1", "binary_name": "emacs24-nox" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "24.5+1-6ubuntu1.1", "binary_name": "emacs24" }, { "binary_version": "24.5+1-6ubuntu1.1", "binary_name": "emacs24-bin-common" }, { "binary_version": "24.5+1-6ubuntu1.1", "binary_name": "emacs24-common" }, { "binary_version": "24.5+1-6ubuntu1.1", "binary_name": "emacs24-el" }, { "binary_version": "24.5+1-6ubuntu1.1", "binary_name": "emacs24-lucid" }, { "binary_version": "24.5+1-6ubuntu1.1", "binary_name": "emacs24-nox" } ], "availability": "No subscription required" }