First published: Wed Jun 07 2017(Updated: )
In ytnef 1.9.2, the TNEFFillMapi function in lib/ytnef.c allows remote attackers to cause a denial of service (memory consumption) via a crafted file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libytnef | 1.9.3-1 1.9.3-3 2.0-1 2.1.2-1 | |
ubuntu/libytnef | <1.5-6ubuntu0.2 | 1.5-6ubuntu0.2 |
ubuntu/libytnef | <1.9.3-1 | 1.9.3-1 |
ytnef | =1.9.2 | |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9473 has a severity rating of moderate due to its potential to cause a denial of service through memory consumption.
To fix CVE-2017-9473, upgrade to versions 1.9.3-1 or later for Debian and Ubuntu as specified in the software repository.
The impact of CVE-2017-9473 is a denial of service that can occur when processing crafted files, leading to excessive memory usage.
CVE-2017-9473 affects ytnef version 1.9.2 and lower across different operating systems and package managers.
No, it is not safe to use older versions of libytnef, specifically anything before version 1.9.3, due to the vulnerability in CVE-2017-9473.