Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-30203

Опубликовано: 25 мар. 2024
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

In Emacs before 29.3, Gnus treats inline MIME contents as trusted.

A flaw was found in Emacs. When Emacs is used as an email client, inline MIME attachments are considered to be trusted by default, allowing a crafted LaTeX document to exhaust the disk space or the inodes allocated for the partition where the /tmp directory is located. This issue possibly results in a denial of service.

Отчет

This issue is very similar to CVE-2024-30204. See https://access.redhat.com/security/cve/CVE-2024-30204. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. Red Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and following least privilege principles to ensure that only authorized users and roles can execute or modify code. Event logs are collected and processed for centralization, correlation, analysis, monitoring, alerting, and retention, ensuring that audit records are generated for security-relevant events involving sensitive data and that mechanisms such as digital signatures and certificates verify the authenticity and origin of logged information. Certificates for both external infrastructure and internal cluster components are established and maintained within a secure environment, using cryptographic authentication to prevent the acceptance of untrusted data. The platform also enforces FIPS-validated cryptographic modules across all compute resources, helping ensure that intercepted data cannot be accessed or interpreted by unauthorized actors.

Меры по смягчению последствий

Do not open emails from untrusted sources.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6emacsOut of support scope
Red Hat Enterprise Linux 7emacsOut of support scope
Red Hat Enterprise Linux 8emacsFixedRHSA-2024:698724.09.2024
Red Hat Enterprise Linux 8emacsFixedRHSA-2024:698724.09.2024
Red Hat Enterprise Linux 9emacsFixedRHSA-2024:930212.11.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-349
https://bugzilla.redhat.com/show_bug.cgi?id=2280296emacs: Gnus treats inline MIME contents as trusted

EPSS

Процентиль: 6%
0.00027
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 1 года назад

In Emacs before 29.3, Gnus treats inline MIME contents as trusted.

CVSS3: 5.5
nvd
около 1 года назад

In Emacs before 29.3, Gnus treats inline MIME contents as trusted.

CVSS3: 5.5
msrc
7 месяцев назад

Описание отсутствует

CVSS3: 5.5
debian
около 1 года назад

In Emacs before 29.3, Gnus treats inline MIME contents as trusted.

CVSS3: 5.5
github
около 1 года назад

In Emacs before 29.3, Gnus treats inline MIME contents as trusted.

EPSS

Процентиль: 6%
0.00027
Низкий

5.5 Medium

CVSS3