First published: Mon Sep 07 2009(Updated: )
Multiple directory traversal and buffer overflow vulnerabilities were discovered in yTNEF, and in Evolution's TNEF parser that is derived from yTNEF. A crafted email could cause these applications to write data in arbitrary locations on the filesystem, crash, or potentially execute arbitrary code when decoding attachments.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ytnef | ||
ytnef |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3887 is classified as a critical severity vulnerability due to its potential to execute arbitrary code.
To fix CVE-2009-3887, update to the latest version of the affected software, ytnef, that addresses these vulnerabilities.
CVE-2009-3887 affects the ytnef package and Evolution's TNEF parser derived from ytnef.
CVE-2009-3887 can be exploited through crafted emails that trigger directory traversal and buffer overflow conditions.
The potential consequences of CVE-2009-3887 include unauthorized data writing, application crashes, and execution of arbitrary code.