Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2010-5109

Published: 5 May 2014

Off-by-one error in the DecompressRTF function in ytnef.c in Yerase's TNEF Stream Reader allows remote attackers to cause a denial of service (crash) via a crafted TNEF file, which triggers a buffer overflow.

Notes

AuthorNote
jdstrand
this is a DoS only since the memory after the unterminated
comp_Prebuf.data is not actually access anywhere.
libytnef0 is only used by evolution on 10.04 LTS and later.
libytnef is linked in to modules/module-tnef-attachment.so from
libevolution on 12.10 and later.
plugins/liborg-gnome-tnef-attachments.so on 12.04 and earlier. This
is shipped in the evolution-plugins-experimental package, from universe
on 13.10+, PoC is recognized as TNEF file, but not all attachments
are shown (not security)
on 12.04, recognized as TNEF file, but not all attachments are shown
(not security)
on 11.10 and earlier, no crash (not security)

Priority

Low

Status

Package Release Status
libytnef
Launchpad, Ubuntu, Debian
hardy Ignored
(end of life)
lucid Ignored

oneiric Ignored

precise Ignored

quantal Ignored

trusty Does not exist
(trusty was not-affected [1.5-6])
upstream
Released (1.5-5)