First published: Fri Dec 30 2016(Updated: )
It was found that unrtf is vulnerable to multiple buffer overflow flaws in cmd_* functions. If any exposed application uses unrtf to process untrusted input, these flaws might lead to a denial-of-service. References: <a href="http://seclists.org/oss-sec/2016/q4/786">http://seclists.org/oss-sec/2016/q4/786</a> Originally reported in: <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849705">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849705</a> Patch: <a href="http://hg.savannah.gnu.org/hgweb/unrtf/rev/3b16893a6406">http://hg.savannah.gnu.org/hgweb/unrtf/rev/3b16893a6406</a>
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/unrtf | <=0.21.5-1<=0.21.9-clean-2<=0.21.5-3 | 0.21.9-clean-3 0.21.5-3+deb8u1 |
debian/unrtf | 0.21.10-clean-1 | |
UnRTF | =0.21.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10091 is classified as a high severity vulnerability due to potential denial-of-service risks.
To remediate CVE-2016-10091, upgrade to unrtf version 0.21.10-clean-1 or later.
Versions of unrtf up to and including 0.21.9-clean-2 are vulnerable to CVE-2016-10091.
CVE-2016-10091 is primarily exploitable via buffer overflow flaws that could lead to denial-of-service conditions.
Yes, CVE-2016-10091 affects Debian packages of unrtf, specifically versions prior to 0.21.10-clean-1.