Michal Zalewski reported  an out-of-bounds memory access vulnerability in unrtf. Processing a malformed RTF file could lead to a segfault while accessing a pointer that may be under the attacker's control. This would lead to a denial of service (application crash) or, potentially, the execution of arbitrary code.
Hanno Böck also reported  a number of other crashes in unrtf.
There has been no response upstream regarding this (it seems that unrtf is no longer being maintained) so there is no patch available as of yet.
CVE request on oss-sec here:
Created unrtf tracking bugs for this issue:
Affects: fedora-all [bug 1170235]
Affects: epel-6 [bug 1170236]
Affects: epel-7 [bug 1170237]
This likely will require more than one CVE, but we'll see what MITRE says/does. Mentioning both reports here is ok as there are no patches available for any of it.
MITRE assigned two CVEs (CVE-2014-9274, CVE-2014-9275) to these issues:
Jean-Francois Dockes proposed fixes for both CVEs.
CVE-2014-9274 is addressed by
CVE-2014-9275 is addressed by
All three changes were incorporated upstream and shipped as a part of unrtf 0.21.6. (http://hg.savannah.gnu.org/hgweb/unrtf/rev/891c2f431c90)
So we should just push the newer version (0.21.6 or later) to all Fedora and EPEL branches.
unrtf-0.21.7-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
unrtf-0.21.7-1.el7 has been pushed to the Fedora EPEL 7 stable repository. If problems still persist, please make note of it in this bug report.
unrtf-0.21.7-1.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.