Source: tnef Version: 1.4.12-1.2 Severity: grave Tags: security upstream Justification: user security hole Forwarded: https://github.com/verdammelt/tnef/pull/40
Hi, The following vulnerability was published for tnef. CVE-2019-18849[0]: | In tnef before 1.4.18, an attacker may be able to write to the | victim's .ssh/authorized_keys file via an e-mail message with a | crafted winmail.dat application/ms-tnef attachment, because of a heap- | based buffer over-read involving strdup. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2019-18849 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18849 [1] https://github.com/verdammelt/tnef/pull/40 Please adjust the affected versions in the BTS as needed. Regards, Salvatore