[USN-4615-1] Yerase's TNEF vulnerabilities

Paulo Flabiano Smorigo pfsmorigo at canonical.com
Tue Nov 3 20:42:28 UTC 2020


==========================================================================
Ubuntu Security Notice USN-4615-1
November 03, 2020

libytnef vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

Yerase's TNEF could be made to crash if it received specially crafted
input.

Software Description:
- libytnef: Yerases TNEF Stream Reader library

Details:

It was discovered that Yerase's TNEF had null pointer dereferences, infinite
loop, buffer overflow, out of bounds reads, directory traversal issues and
other vulnerabilities. An attacker could use those issues to cause a crash
and consequently a denial of service. (CVE-2017-6298, CVE-2017-6299,
CVE-2017-6300, CVE-2017-6301, CVE-2017-6302, CVE-2017-6303, CVE-2017-6304,
CVE-2017-6305, CVE-2017-6306, CVE-2017-6800, CVE-2017-6801, CVE-2017-6802)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
  libytnef0                       1.5-9ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
  https://usn.ubuntu.com/4615-1
  CVE-2017-6298, CVE-2017-6299, CVE-2017-6300, CVE-2017-6301,
  CVE-2017-6302, CVE-2017-6303, CVE-2017-6304, CVE-2017-6305,
  CVE-2017-6306, CVE-2017-6800, CVE-2017-6801, CVE-2017-6802

Package Information:
  https://launchpad.net/ubuntu/+source/libytnef/1.5-9ubuntu0.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20201103/df673750/attachment.sig>


More information about the ubuntu-security-announce mailing list