First published: Wed Jun 07 2017(Updated: )
In ytnef 1.9.2, the SwapWord function in lib/ytnef.c allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/libytnef | <1.5-6ubuntu0.2 | 1.5-6ubuntu0.2 |
ubuntu/libytnef | <1.9.3-1 | 1.9.3-1 |
debian/libytnef | 1.9.3-1 1.9.3-3 2.0-1 2.1.2-1 | |
ytnef | =1.9.2 | |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9471 is classified as a denial of service vulnerability that can lead to application crashes.
To fix CVE-2017-9471, update the libytnef package to version 1.9.3-1 or higher.
CVE-2017-9471 affects ytnef version 1.9.2 and various versions of the libytnef package on Ubuntu and Debian systems.
CVE-2017-9471 can be exploited by attackers through crafted files that trigger heap-based buffer over-read.
CVE-2017-9471 primarily results in service disruption but does not directly compromise user data.