First published: Tue Feb 09 2021(Updated: )
In ytnef 1.9.3, the SwapWord function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a heap buffer overflow which can be triggered via a crafted file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ytnef | =1.9.3 | |
Red Hat Enterprise Linux | =7.0 | |
Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3404 has a severity rating that may allow remote attackers to cause denial-of-service and potentially code execution.
To mitigate CVE-2021-3404, you should upgrade ytnef to version 1.9.4 or later.
CVE-2021-3404 affects ytnef version 1.9.3, Red Hat Enterprise Linux 7.0, and Fedora 33.
CVE-2021-3404 is a heap buffer overflow vulnerability that can be exploited through crafted files.
Yes, CVE-2021-3404 may potentially allow attackers to execute arbitrary code on vulnerable systems.