1 |
type: security |
2 |
subject: Updated libytnef packages fix security vulnerabilities |
3 |
CVE: |
4 |
- CVE-2017-6298 |
5 |
- CVE-2017-6299 |
6 |
- CVE-2017-6300 |
7 |
- CVE-2017-6301 |
8 |
- CVE-2017-6302 |
9 |
- CVE-2017-6303 |
10 |
- CVE-2017-6304 |
11 |
- CVE-2017-6305 |
12 |
- CVE-2017-6306 |
13 |
- CVE-2017-6800 |
14 |
- CVE-2017-6801 |
15 |
- CVE-2017-6802 |
16 |
- CVE-2017-9058 |
17 |
src: |
18 |
5: |
19 |
core: |
20 |
- libytnef-1.5-10.2.mga5 |
21 |
description: | |
22 |
Several issues were discovered in libytnef, a library used to decode |
23 |
application/ms-tnef e-mail attachments. Multiple heap overflows, |
24 |
out-of-bound writes and reads, NULL pointer dereferences and infinite |
25 |
loops could be exploited by tricking a user into opening a maliciously |
26 |
crafted winmail.dat file (CVE-2017-6298, CVE-2017-6299, CVE-2017-6300, |
27 |
CVE-2017-6301, CVE-2017-6302, CVE-2017-6303, CVE-2017-6304, |
28 |
CVE-2017-6305, CVE-2017-6306, CVE-2017-6800, CVE-2017-6801, |
29 |
CVE-2017-6802). |
30 |
|
31 |
A heap-buffer-overflow vulnerability in libytnef due to an incorrect |
32 |
boundary checking in SIZECHCK macro in lib/ytnef.c (CVE-2017-9058). |
33 |
references: |
34 |
- https://bugs.mageia.org/show_bug.cgi?id=20893 |
35 |
- http://openwall.com/lists/oss-security/2017/02/15/4 |
36 |
- https://www.debian.org/security/2017/dsa-3846 |
37 |
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862556 |
38 |
ID: MGASA-2017-0174 |