Headline
CVE-2021-3404: heap-based buffer overflow in SwapWord function in lib/ytnef.c via crafted file
In ytnef 1.9.3, the SwapWord function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a heap buffer overflow which can be triggered via a crafted file.
Description Guilherme de Almeida Suckevicz 2021-02-09 18:44:55 UTC
In ytnef 1.9.3, the SwapWord function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a heap buffer overflow which can be triggered via a crafted file.
Reference: https://github.com/Yeraze/ytnef/issues/86
Comment 1 Guilherme de Almeida Suckevicz 2021-02-09 18:45:20 UTC
Created ytnef tracking bugs for this issue:
Affects: epel-7 [bug 1926971] Affects: fedora-all [bug 1926969]
Comment 2 Product Security DevOps Team 2021-02-09 22:09:52 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.