USN-3288-1: libytnef vulnerabilities
Publication date
15 May 2017
Overview
libytnef could be made to crash or run programs as your login if it opened a specially crafted file.
Releases
Packages
- libytnef - improved decoder for application/ms-tnef attachments
Details
It was discovered that libytnef incorrectly handled malformed TNEF streams.
If a user were tricked into opening a specially crafted TNEF attachment, an
attacker could cause a denial of service or possibly execute arbitrary
code.
It was discovered that libytnef incorrectly handled malformed TNEF streams.
If a user were tricked into opening a specially crafted TNEF attachment, an
attacker could cause a denial of service or possibly execute arbitrary
code.
Update instructions
After a standard system update you need to restart applications using libytnef, such as Evolution, to make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
14.04 trusty | libytnef0 – 1.5-6ubuntu0.1 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.
References
- CVE-2017-6802
- CVE-2017-6801
- CVE-2017-6800
- CVE-2017-6306
- CVE-2017-6305
- CVE-2017-6304
- CVE-2017-6303
- CVE-2017-6302
- CVE-2017-6301
- CVE-2017-6300
- CVE-2017-6802
- CVE-2017-6801
- CVE-2017-6800
- CVE-2017-6306
- CVE-2017-6305
- CVE-2017-6304
- CVE-2017-6303
- CVE-2017-6302
- CVE-2017-6301
- CVE-2017-6300
- CVE-2017-6299
- CVE-2017-6298