In tnef before 1.4.18, an attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message with a crafted winmail.dat application/ms-tnef attachment, because of a heap-based buffer over-read involving strdup.
[
{
"signature_version": "v1",
"source": "https://github.com/verdammelt/tnef/commit/8edd0e046736764c6decc8cd6e0e739438408f3e",
"deprecated": false,
"target": {
"file": "src/main.c",
"function": "parse_cmdline"
},
"signature_type": "Function",
"id": "CVE-2019-18849-0c99bc39",
"digest": {
"function_hash": "197527520806726047393812687626000968189",
"length": 3966.0
}
},
{
"signature_version": "v1",
"source": "https://github.com/verdammelt/tnef/commit/8edd0e046736764c6decc8cd6e0e739438408f3e",
"deprecated": false,
"target": {
"file": "src/main.c"
},
"signature_type": "Line",
"id": "CVE-2019-18849-586681cd",
"digest": {
"line_hashes": [
"17390164876592905577376831902072063451",
"109240640345055473013296847978297599553",
"137785748995152623693204248295444430259",
"155667681579234382799527855881423726826"
],
"threshold": 0.9
}
}
]