==========================================================================
Ubuntu Security Notice USN-3288-1
May 15, 2017
libytnef vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 LTS
Summary:
libytnef could be made to crash or run programs as your login if it opened
a specially crafted file.
Software Description:
– libytnef: improved decoder for application/ms-tnef attachments
Details:
It was discovered that libytnef incorrectly handled malformed TNEF streams.
If a user were tricked into opening a specially crafted TNEF attachment, an
attacker could cause a denial of service or possibly execute arbitrary
code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
libytnef0 1.5-6ubuntu0.1
After a standard system update you need to restart applications using
libytnef, such as Evolution, to make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-3288-1
CVE-2017-6298, CVE-2017-6299, CVE-2017-6300, CVE-2017-6301,
CVE-2017-6302, CVE-2017-6303, CVE-2017-6304, CVE-2017-6305,
CVE-2017-6306, CVE-2017-6800, CVE-2017-6801, CVE-2017-6802
Package Information:
https://launchpad.net/ubuntu/+source/libytnef/1.5-6ubuntu0.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=NlLg
—–END PGP SIGNATURE—–
—