Description
In tnef before 1.4.18, an attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message with a crafted winmail.dat application/ms-tnef attachment, because of a heap-based buffer over-read involving strdup.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2005-1 | tnef security update |
Debian DLA |
DLA-2748-1 | tnef security update |
EUVD |
EUVD-2019-8547 | In tnef before 1.4.18, an attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message with a crafted winmail.dat application/ms-tnef attachment, because of a heap-based buffer over-read involving strdup. |
Ubuntu USN |
USN-4524-1 | TNEF vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:02:39.534Z
Reserved: 2019-11-11T00:00:00.000Z
Link: CVE-2019-18849
No data.
Status : Modified
Published: 2019-11-11T04:15:10.530
Modified: 2024-11-21T04:33:42.520
Link: CVE-2019-18849
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN