6.8
CVSSv2

CVE-2017-9146

Published: 22/05/2017 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The TNEFFillMapi function in lib/ytnef.c in libytnef in ytnef up to and including 1.9.2 does not ensure a nonzero count value before a certain memory allocation, which allows remote malicious users to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted tnef file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ytnef project ytnef

Vendor Advisories

Debian Bug report logs - #862707 libytnef: CVE-2017-9146: Heap-buffer overrun: write extra bytes in TNEFFillMapi Package: libytnef; Maintainer for libytnef is Ricardo Mones <mones@debianorg>; Reported by: "bingosxs" <bingosxs@qqcom> Date: Tue, 16 May 2017 02:06:05 UTC Severity: important Tags: fixed-upstream, secur ...
Several security issues were fixed in libytnef ...