In tnef before 1.4.18, an attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message with a crafted winmail.dat application/ms-tnef attachment, because of a heap-based buffer over-read involving strdup.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://github.com/verdammelt/tnef/pull/40 | exploit third party advisory patch |
https://github.com/verdammelt/tnef/compare/1.4.17...1.4.18 | third party advisory patch |
https://lists.debian.org/debian-lts-announce/2019/11/msg00035.html | third party advisory mailing list |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RMKFSHPMOZL7MDWU5RYOTIBTRWSZ4Z6X/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7CPKBW4QZ4VIY4UXIUVUSHRJ4R2FROE/ | vendor advisory |
https://usn.ubuntu.com/4524-1/ | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2021/08/msg00025.html | third party advisory mailing list |