Vigil@nce - libytnef: three vulnerabilities
May 2017 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of libytnef.
Impacted products: Debian, Ubuntu.
Severity: 2/4.
Creation date: 29/03/2017.
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in libytnef.
An attacker can force a read at an invalid address via
MAPIPrint(), in order to trigger a denial of service, or to obtain
sensitive information. [severity:2/4; CVE-2017-6800]
An attacker can force a read at an invalid address via
TNEFParse(), in order to trigger a denial of service, or to obtain
sensitive information. [severity:2/4; CVE-2017-6801]
An attacker can force a read at an invalid address via
DecompressRTF(), in order to trigger a denial of service, or to
obtain sensitive information. [severity:2/4; CVE-2017-6802]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/libytnef-three-vulnerabilities-22274