In tnef before 1.4.18, an attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message with a crafted winmail.dat application/ms-tnef attachment, because of a heap-based buffer over-read involving strdup.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-18849.json"
[
{
"id": "CVE-2019-18849-0c99bc39",
"source": "https://github.com/verdammelt/tnef/commit/8edd0e046736764c6decc8cd6e0e739438408f3e",
"digest": {
"length": 3966.0,
"function_hash": "197527520806726047393812687626000968189"
},
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "src/main.c",
"function": "parse_cmdline"
},
"signature_type": "Function"
},
{
"id": "CVE-2019-18849-586681cd",
"source": "https://github.com/verdammelt/tnef/commit/8edd0e046736764c6decc8cd6e0e739438408f3e",
"digest": {
"threshold": 0.9,
"line_hashes": [
"17390164876592905577376831902072063451",
"109240640345055473013296847978297599553",
"137785748995152623693204248295444430259",
"155667681579234382799527855881423726826"
]
},
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "src/main.c"
},
"signature_type": "Line"
}
]