An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability. Upstream bug: https://github.com/libofx/libofx/issues/9 References: https://bugzilla.novell.com/show_bug.cgi?id=1058673 https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317
Created libofx tracking bugs for this issue: Affects: epel-all [bug 1492202] Affects: fedora-all [bug 1492203]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.