/[advisories]/20893.adv
ViewVC logotype

Contents of /20893.adv

Parent Directory Parent Directory | Revision Log Revision Log


Revision 5729 - (show annotations) (download)
Wed Jun 14 15:38:14 2017 UTC (6 years, 10 months ago) by neoclust
File size: 1254 byte(s)
MGASA-2017-0174: libytnef-1.5-10.2.mga5
1 type: security
2 subject: Updated libytnef packages fix security vulnerabilities
3 CVE:
4 - CVE-2017-6298
5 - CVE-2017-6299
6 - CVE-2017-6300
7 - CVE-2017-6301
8 - CVE-2017-6302
9 - CVE-2017-6303
10 - CVE-2017-6304
11 - CVE-2017-6305
12 - CVE-2017-6306
13 - CVE-2017-6800
14 - CVE-2017-6801
15 - CVE-2017-6802
16 - CVE-2017-9058
17 src:
18 5:
19 core:
20 - libytnef-1.5-10.2.mga5
21 description: |
22 Several issues were discovered in libytnef, a library used to decode
23 application/ms-tnef e-mail attachments. Multiple heap overflows,
24 out-of-bound writes and reads, NULL pointer dereferences and infinite
25 loops could be exploited by tricking a user into opening a maliciously
26 crafted winmail.dat file (CVE-2017-6298, CVE-2017-6299, CVE-2017-6300,
27 CVE-2017-6301, CVE-2017-6302, CVE-2017-6303, CVE-2017-6304,
28 CVE-2017-6305, CVE-2017-6306, CVE-2017-6800, CVE-2017-6801,
29 CVE-2017-6802).
30
31 A heap-buffer-overflow vulnerability in libytnef due to an incorrect
32 boundary checking in SIZECHCK macro in lib/ytnef.c (CVE-2017-9058).
33 references:
34 - https://bugs.mageia.org/show_bug.cgi?id=20893
35 - http://openwall.com/lists/oss-security/2017/02/15/4
36 - https://www.debian.org/security/2017/dsa-3846
37 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862556
38 ID: MGASA-2017-0174

  ViewVC Help
Powered by ViewVC 1.1.30