MGASA-2014-0533

Source
https://advisories.mageia.org/MGASA-2014-0533.html
Import Source
https://advisories.mageia.org/MGASA-2014-0533.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2014-0533
Related
Published
2014-12-19T15:06:35Z
Modified
2014-12-19T14:57:37Z
Summary
Updated unrtf package fixes security vulnerabilities
Details

Updated unrtf package fixes security vulnerabilities:

Michal Zalewski reported an out-of-bounds memory access vulnerability in unrtf. Processing a malformed RTF file could lead to a segfault while accessing a pointer that may be under the attacker's control. This would lead to a denial of service (application crash) or, potentially, the execution of arbitrary code (CVE-2014-9274).

Hanno Böck also reported a number of other crashes in unrtf (CVE-2014-9275).

References
Credits

Affected packages

Mageia:4 / unrtf

Package

Name
unrtf
Purl
pkg:rpm/mageia/unrtf?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.21.7-1.mga4

Ecosystem specific

{
    "section": "core"
}