Lucene search

K
mageiaGentoo FoundationMGASA-2014-0531
HistoryDec 19, 2014 - 6:06 p.m.

Updated claws-mail packages fix security vulnerability

2014-12-1918:06:35
Gentoo Foundation
advisories.mageia.org
19

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

EPSS

0.022

Percentile

89.6%

Off-by-one error in the DecompressRTF function in ytnef.c in Yerase’s TNEF Stream Reader allows remote attackers to cause a denial of service (crash) via a crafted TNEF file, which triggers a buffer overflow (CVE-2010-5109). The claws-mail package contains an embedded copf of libytnef, which has been patched to fix this issue.

OSVersionArchitecturePackageVersionFilename
Mageia4noarchclaws-mail< 3.11.1-1.1claws-mail-3.11.1-1.1.mga4

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

EPSS

0.022

Percentile

89.6%