Bug#870193: libytnef: CVE-2017-9472: heap-based buffer overflow in SwapDWord
Source: libytnef
Version: 1.9.2-2
Severity: important
Tags: security upstream
Forwarded: https://github.com/Yeraze/ytnef/issues/41
Hi,
the following vulnerability was published for libytnef.
CVE-2017-9472[0]:
| In ytnef 1.9.2, the SwapDWord function in lib/ytnef.c allows remote
| attackers to cause a denial of service (heap-based buffer over-read and
| application crash) via a crafted file.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2017-9472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9472
[1] https://github.com/Yeraze/ytnef/issues/41
Please adjust the affected versions in the BTS as needed, older
version than 1.9.2 might be affected as well.
Regards,
Salvatore
Reply to: