First published: Fri Dec 30 2016(Updated: )
It was found that unrtf is vulnerable to multiple buffer overflow flaws in cmd_* functions. If any exposed application uses unrtf to process untrusted input, these flaws might lead to a denial-of-service. References: <a href="http://seclists.org/oss-sec/2016/q4/786">http://seclists.org/oss-sec/2016/q4/786</a> Originally reported in: <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849705">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849705</a> Patch: <a href="http://hg.savannah.gnu.org/hgweb/unrtf/rev/3b16893a6406">http://hg.savannah.gnu.org/hgweb/unrtf/rev/3b16893a6406</a>
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/unrtf | 0.21.10-clean-1 | |
Unrtf Project Unrtf | =0.21.9 | |
debian/unrtf | <=0.21.5-1<=0.21.9-clean-2<=0.21.5-3 | 0.21.9-clean-3 0.21.5-3+deb8u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.