From secunia security advisory at $URL: Description: Certain input passed via MML tags is not properly sanitised in /emacs/notmuch-mua.el before being used. This can be exploited to attach local files to outgoing messages, if a user is tricked into replying to a message containing a specially crafted MML tag. The vulnerability is reported in versions prior to 0.11.1. Solution Update to version 0.11.1. @maintainer, ok to stabilize?
I have backported this fix already, please see bug #406175.
(In reply to comment #1) > I have backported this fix already, please see bug #406175. OK, fixed then. Close as ~4 noglsa because the affected version never gone stable.
CVE-2012-1103 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1103): emacs/notmuch-mua.el in Notmuch before 0.11.1, when using the Emacs interface, allows user-assisted remote attackers to read arbitrary files via crafted MML tags, which are not properly quoted in an email reply cna cause the files to be attached to the message.