Bugtraq: [SECURITY] [DSA 3798-1] tnef security update

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA512

– ————————————————————————

Debian Security Advisory DSA-3798-1 security (at) debian (dot) org [email concealed]

https://www.debian.org/security/ Sebastien Delafond

March 01, 2017 https://www.debian.org/security/faq

– ————————————————————————

Package : tnef

CVE ID : CVE-2017-6307 CVE-2017-6308 CVE-2017-6309 CVE-2017-6310

Debian Bug : 856117

Eric Sesterhenn, from X41 D-Sec GmbH, discovered several

vulnerabilities in tnef, a tool used to unpack MIME attachments of

type “application/ms-tnef”. Multiple heap overflows, type confusions

and out of bound reads and writes could be exploited by tricking a

user into opening a malicious attachment. This would result in denial

of service via application crash, or potential arbitrary code

execution.

For the stable distribution (jessie), these problems have been fixed in

version 1.4.9-1+deb8u1.

We recommend that you upgrade your tnef packages.

Further information about Debian Security Advisories, how to apply

these updates to your system and frequently asked questions can be

found at: https://www.debian.org/security/

Mailing list: debian-security-announce (at) lists.debian (dot) org [email concealed]

—–BEGIN PGP SIGNATURE—–

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAli2eywACgkQEL6Jg/PV

nWRrrgf/eHvfZ9S80RFxzX1ZYpWvPWFyKEAFT5f2Sz3T1qE7a4VCfjTrVKrtrvaG

7r5yKduTqGfRtThw+VyFNYhlnaeZRA64PaPCjb8AWTZ6rCk3ZADqV39gyjRj2b3E

mjfXpGvA6cpDdsFLmmEgGqRI19lS7WU1d7/jzM74YNVqWJugI525Td7FBHzrasiD

1wX9tqidpvQw0R0AiInH1UasSi397JtF+i/WXDsTOOkP2yGosriuTZtI2AKM55Li

/jFsauFUcnJVINiYoPkb/UZho6jUo/3hm9hm8+mS38uU5pdYHdog6X8aCi2UsHRb

ymX0ocnHI4eDwa4JZdnxejZiLGMx7g==

=cstV

—–END PGP SIGNATURE—–

[ reply ]

Source: SecurityFocus Vulnerabilities @ March 1, 2017 at 04:03AM

0
Share