First published: Wed Dec 03 2014(Updated: )
Michal Zalewski reported [1] an out-of-bounds memory access vulnerability in unrtf. Processing a malformed RTF file could lead to a segfault while accessing a pointer that may be under the attacker's control. This would lead to a denial of service (application crash) or, potentially, the execution of arbitrary code. Hanno Böck also reported [2] a number of other crashes in unrtf. There has been no response upstream regarding this (it seems that unrtf is no longer being maintained) so there is no patch available as of yet. [1] <a href="https://lists.gnu.org/archive/html/bug-unrtf/2014-11/msg00001.html">https://lists.gnu.org/archive/html/bug-unrtf/2014-11/msg00001.html</a> [2] <a href="https://lists.gnu.org/archive/html/bug-unrtf/2014-11/msg00000.html">https://lists.gnu.org/archive/html/bug-unrtf/2014-11/msg00000.html</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Unrtf Project Unrtf | <=0.21.6 | |
Fedoraproject Fedora | =21 | |
Mageia Project Mageia | =4 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.