Multiple vulnerabilities were found in ytnef 1.9.2. CVE-2017-9470 - In ytnef 1.9.2, the MAPIPrint function in lib/ytnef.c allows attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file. https://blogs.gentoo.org/ago/2017/05/24/ytnef-null-pointer-dereference-in-mapiprint-ytnef-c/ CVE-2017-9471 - In ytnef 1.9.2, the SwapWord function in lib/ytnef.c allows attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. https://blogs.gentoo.org/ago/2017/05/24/ytnef-heap-based-buffer-overflow-in-swapword-ytnef-c/ CVE-2017-9472 - In ytnef 1.9.2, the SwapDWord function in lib/ytnef.c allows attackers to cause a denial of service (heap-based buffer over-read anda pplication crash) via a crafted file. https://blogs.gentoo.org/ago/2017/05/24/ytnef-heap-based-buffer-overflow-in-swapdword-ytnef-c/ CVE-2017-9473 - In ytnef 1.9.2, the TNEFFillMapi function in lib/ytnef.c allows attackers to cause a denial of service (memory consumption) via a crafted file. https://blogs.gentoo.org/ago/2017/05/24/ytnef-memory-allocation-failure-in-tneffillmapi-ytnef-c/ CVE-2017-9474 - In ytnef 1.9.2, the DecompressRTF function in lib/ytnef.c allows attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. https://blogs.gentoo.org/ago/2017/05/24/ytnef-heap-based-buffer-overflow-in-decompressrtf-ytnef-c/
Created ytnef tracking bugs for this issue: Affects: epel-all [bug 1459454] Affects: fedora-all [bug 1459453]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.