Debian Security Advisory
DLA-878-1 libytnef -- LTS security update
- Date Reported:
- 28 Mar 2017
- Affected Packages:
- libytnef
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2017-6298, CVE-2017-6299, CVE-2017-6300, CVE-2017-6301, CVE-2017-6302, CVE-2017-6303, CVE-2017-6304, CVE-2017-6305, CVE-2017-6801, CVE-2017-6802.
- More information:
-
- CVE-2017-6298
Null Pointer Deref / calloc return value not checked
- CVE-2017-6299
Infinite Loop / DoS in the TNEFFillMapi function in lib/ytnef.c
- CVE-2017-6300
Buffer Overflow in version field in lib/tnef-types.h
- CVE-2017-6301
Out of Bounds Reads
- CVE-2017-6302
Integer Overflow
- CVE-2017-6303
Invalid Write and Integer Overflow
- CVE-2017-6304
Out of Bounds read
- CVE-2017-6305
Out of Bounds read and write
- CVE-2017-6801
Out-of-bounds access with fields of Size 0 in TNEFParse() in libytnef
- CVE-2017-6802
Heap-based buffer over-read on incoming Compressed RTF Streams, related to DecompressRTF() in libytnef
For Debian 7
Wheezy
, these problems have been fixed in version 1.5-4+deb7u1.We recommend that you upgrade your libytnef packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2017-6298