SB2017060711 - Multiple vulnerabilities in ytnef
Published: June 7, 2017 Updated: September 20, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Heap-based buffer overflow (CVE-ID: CVE-2017-12141)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in In ytnef 1.9.2, a heap-based buffer overflow vulnerability was found in the function TNEFFillMapi in ytnef.c, which. A remote attacker can use a crafted file. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Out-of-bounds read (CVE-ID: CVE-2017-12142)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
In ytnef 1.9.2, an invalid memory read vulnerability was found in the function SwapDWord in ytnef.c, which allows attackers to cause a denial of service via a crafted file.
3) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2017-12144)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
In ytnef 1.9.2, an allocation failure was found in the function TNEFFillMapi in ytnef.c, which allows attackers to cause a denial of service via a crafted file.
4) NULL pointer dereference (CVE-ID: CVE-2017-9470)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via a crafted file.
5) Out-of-bounds read (CVE-ID: CVE-2017-9472)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in In ytnef 1.9.2, the SwapDWord function in lib/ytnef.c. A remote attacker can perform a denial of service (heap-based buffer over-read and application crash) via a crafted file.
6) Out-of-bounds read (CVE-ID: CVE-2017-9474)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in In ytnef 1.9.2, the DecompressRTF function in lib/ytnef.c. A remote attacker can perform a denial of service (heap-based buffer over-read and application crash) via a crafted file.
Remediation
Install update from vendor's website.
References
- https://github.com/Yeraze/ytnef/issues/50
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LFJWMUEUC4ILH2HEOCYVVLQT654ZMCGQ/
- https://somevulnsofadlab.blogspot.com/2017/07/ytnefheap-buffer-overflow-in.html
- https://usn.ubuntu.com/3667-1/
- https://github.com/Yeraze/ytnef/issues/49
- https://somevulnsofadlab.blogspot.com/2017/07/ytnefinvalid-memory-read-in-swapdword.html
- http://www.securityfocus.com/bid/100098
- https://github.com/Yeraze/ytnef/issues/51
- https://somevulnsofadlab.blogspot.com/2017/07/ytnefallocation-failed-in-tneffillmapi.html
- https://blogs.gentoo.org/ago/2017/05/24/ytnef-null-pointer-dereference-in-mapiprint-ytnef-c/
- https://blogs.gentoo.org/ago/2017/05/24/ytnef-heap-based-buffer-overflow-in-swapdword-ytnef-c/
- https://blogs.gentoo.org/ago/2017/05/24/ytnef-heap-based-buffer-overflow-in-decompressrtf-ytnef-c/