Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30204: n/a

0
Low
VulnerabilityCVE-2024-30204cvecve-2024-30204
Published: Mon Mar 25 2024 (03/25/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In Emacs before 29.3, LaTeX preview is enabled by default for e-mail attachments.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 12:04:32 UTC

Technical Analysis

CVE-2024-30204 identifies a vulnerability in Emacs versions prior to 29.3 related to the default enabling of LaTeX preview for email attachments. Emacs, a widely used extensible text editor, includes functionality to preview LaTeX content embedded in emails. In the affected versions, this preview feature is enabled by default, which means that when a user opens an email with a LaTeX attachment, Emacs automatically processes and renders the LaTeX content. This automatic processing can be exploited by an attacker who crafts malicious LaTeX attachments designed to consume excessive system resources or trigger denial of service conditions. The vulnerability is classified under CWE-276 (Incorrect Default Permissions), indicating that the default configuration leads to a security weakness. The CVSS v3.1 base score is 2.8, reflecting a low severity level due to the requirement of local access, low complexity of attack, the need for user interaction, and the limited impact on confidentiality and integrity. The attack vector is local (AV:L), with low attack complexity (AC:L), requiring privileges (PR:L) and user interaction (UI:R). The scope remains unchanged (S:U), and the impact is limited to availability (A:L) without affecting confidentiality or integrity. No patches or known exploits are currently reported, but the vulnerability highlights a risk where automatic processing of email attachments can lead to resource exhaustion or denial of service. This issue primarily affects users who rely on Emacs for email reading and LaTeX rendering, especially in environments where malicious actors might send crafted LaTeX attachments.

Potential Impact

The primary impact of CVE-2024-30204 is on system availability due to potential denial of service caused by automatic LaTeX preview processing in email attachments. An attacker could exploit this by sending specially crafted LaTeX attachments that consume excessive CPU or memory resources when rendered by Emacs, leading to application slowdown or crashes. Since the vulnerability requires local access and user interaction to trigger, the risk of widespread remote exploitation is low. Confidentiality and integrity of data are not affected. However, organizations that use Emacs extensively for email handling, particularly in academic, research, or technical environments where LaTeX emails are common, may experience disruptions. The vulnerability could be leveraged in targeted attacks to disrupt workflows or cause temporary denial of service on affected systems. Given the low CVSS score and absence of known exploits, the overall impact is limited but should not be ignored in sensitive or high-availability environments.

Mitigation Recommendations

To mitigate CVE-2024-30204, organizations and users should first consider upgrading Emacs to version 29.3 or later, where this vulnerability is addressed. If immediate upgrade is not feasible, users should disable the default LaTeX preview feature for email attachments by adjusting Emacs configuration settings to prevent automatic rendering. Specifically, modifying or disabling the relevant hooks or functions that trigger LaTeX preview on email attachments can reduce exposure. Additionally, users should exercise caution when opening emails with LaTeX attachments from untrusted sources, and implement email filtering to block or quarantine suspicious attachments. Employing endpoint security solutions that monitor resource usage anomalies may help detect exploitation attempts. Regularly reviewing and applying security updates for Emacs and related packages is essential. Finally, educating users about the risks of opening unexpected LaTeX attachments can further reduce the likelihood of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dbcb7ef31ef0b58d721

Added to database: 2/25/2026, 9:46:36 PM

Last enriched: 2/26/2026, 12:04:32 PM

Last updated: 4/12/2026, 6:19:00 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses