Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-18849

Опубликовано: 11 нояб. 2019
Источник: debian
EPSS Низкий

Описание

In tnef before 1.4.18, an attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message with a crafted winmail.dat application/ms-tnef attachment, because of a heap-based buffer over-read involving strdup.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tneffixed1.4.18-1package
tneffixed1.4.12-1.2+deb10u1busterpackage

Примечания

  • https://github.com/verdammelt/tnef/pull/40

EPSS

Процентиль: 77%
0.01023
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 6 лет назад

In tnef before 1.4.18, an attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message with a crafted winmail.dat application/ms-tnef attachment, because of a heap-based buffer over-read involving strdup.

CVSS3: 5.5
nvd
около 6 лет назад

In tnef before 1.4.18, an attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message with a crafted winmail.dat application/ms-tnef attachment, because of a heap-based buffer over-read involving strdup.

CVSS3: 5.5
github
больше 3 лет назад

In tnef before 1.4.18, an attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message with a crafted winmail.dat application/ms-tnef attachment, because of a heap-based buffer over-read involving strdup.

EPSS

Процентиль: 77%
0.01023
Низкий