First published: Fri Mar 10 2017(Updated: )
An issue was discovered in ytnef before 1.9.2. There is a potential heap-based buffer over-read on incoming Compressed RTF Streams, related to DecompressRTF() in libytnef.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ytnef | <=1.9.1 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6802 has a medium severity rating due to the potential for exploitation via heap-based buffer over-reads.
To fix CVE-2017-6802, update ytnef to version 1.9.2 or later.
Versions of ytnef prior to 1.9.2, specifically all versions up to and including 1.9.1, are affected by CVE-2017-6802.
CVE-2017-6802 impacts systems running ytnef versions before 1.9.2, including Debian Linux versions 8.0 and 9.0.
CVE-2017-6802 affects the handling of incoming Compressed RTF Streams in the DecompressRTF() function.