First published: Wed Dec 03 2014(Updated: )
Michal Zalewski reported [1] an out-of-bounds memory access vulnerability in unrtf. Processing a malformed RTF file could lead to a segfault while accessing a pointer that may be under the attacker's control. This would lead to a denial of service (application crash) or, potentially, the execution of arbitrary code. Hanno Böck also reported [2] a number of other crashes in unrtf. There has been no response upstream regarding this (it seems that unrtf is no longer being maintained) so there is no patch available as of yet. [1] <a href="https://lists.gnu.org/archive/html/bug-unrtf/2014-11/msg00001.html">https://lists.gnu.org/archive/html/bug-unrtf/2014-11/msg00001.html</a> [2] <a href="https://lists.gnu.org/archive/html/bug-unrtf/2014-11/msg00000.html">https://lists.gnu.org/archive/html/bug-unrtf/2014-11/msg00000.html</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
UnRTF | <=0.21.6 | |
Fedora | =21 | |
Mageia | =4 | |
Debian | =7.0 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9274 is classified as a high severity vulnerability due to its potential to cause application crashes and possible remote code execution.
To fix CVE-2014-9274, update to a patched version of UnRTF that is beyond version 0.21.6.
Exploiting CVE-2014-9274 can lead to a denial of service through application crashes or potentially allow execution of arbitrary code.
CVE-2014-9274 affects UnRTF versions up to and including 0.21.6.
CVE-2014-9274 can affect multiple operating systems including Fedora, Debian, and Mageia, depending on the version of UnRTF used.