Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-3721

Опубликовано: 07 сент. 2009
Источник: redhat

Описание

Multiple directory traversal and buffer overflow vulnerabilities were discovered in yTNEF, and in Evolution's TNEF parser that is derived from yTNEF. A crafted email could cause these applications to write data in arbitrary locations on the filesystem, crash, or potentially execute arbitrary code when decoding attachments.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=521662evolution: TNEF attachment decoder input sanitization errors (oCERT-2009-013)

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 4 лет назад

Multiple directory traversal and buffer overflow vulnerabilities were discovered in yTNEF, and in Evolution's TNEF parser that is derived from yTNEF. A crafted email could cause these applications to write data in arbitrary locations on the filesystem, crash, or potentially execute arbitrary code when decoding attachments.

CVSS3: 7.8
nvd
больше 4 лет назад

Multiple directory traversal and buffer overflow vulnerabilities were discovered in yTNEF, and in Evolution's TNEF parser that is derived from yTNEF. A crafted email could cause these applications to write data in arbitrary locations on the filesystem, crash, or potentially execute arbitrary code when decoding attachments.

CVSS3: 7.8
debian
больше 4 лет назад

Multiple directory traversal and buffer overflow vulnerabilities were ...

github
больше 3 лет назад

Multiple directory traversal and buffer overflow vulnerabilities were discovered in yTNEF, and in Evolution's TNEF parser that is derived from yTNEF. A crafted email could cause these applications to write data in arbitrary locations on the filesystem, crash, or potentially execute arbitrary code when decoding attachments.