{"id":"CVE-2017-17844","details":"An issue was discovered in Enigmail before 1.9.9. A remote attacker can obtain cleartext content by sending an encrypted data block (that the attacker cannot directly decrypt) to a victim, and relying on the victim to automatically decrypt that block and then send it back to the attacker as quoted text, aka the TBE-01-005 \"replay\" issue.","modified":"2026-03-15T22:24:07.877945Z","published":"2017-12-27T17:08:19.717Z","related":["MGASA-2017-0477"],"references":[{"type":"WEB","url":"https://www.mail-archive.com/enigmail-users%40enigmail.net/msg04280.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html"},{"type":"ADVISORY","url":"https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-security-announce/2017/msg00333.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-4070"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"1.9.9"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-17844.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}]}