In tnef before 1.4.18, an attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message with a crafted winmail.dat application/ms-tnef attachment, because of a heap-based buffer over-read involving strdup.
[
{
"digest": {
"function_hash": "197527520806726047393812687626000968189",
"length": 3966.0
},
"deprecated": false,
"signature_type": "Function",
"signature_version": "v1",
"source": "https://github.com/verdammelt/tnef/commit/8edd0e046736764c6decc8cd6e0e739438408f3e",
"id": "CVE-2019-18849-0c99bc39",
"target": {
"function": "parse_cmdline",
"file": "src/main.c"
}
},
{
"digest": {
"line_hashes": [
"17390164876592905577376831902072063451",
"109240640345055473013296847978297599553",
"137785748995152623693204248295444430259",
"155667681579234382799527855881423726826"
],
"threshold": 0.9
},
"deprecated": false,
"signature_type": "Line",
"signature_version": "v1",
"source": "https://github.com/verdammelt/tnef/commit/8edd0e046736764c6decc8cd6e0e739438408f3e",
"id": "CVE-2019-18849-586681cd",
"target": {
"file": "src/main.c"
}
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-18849.json"