Ubuntu alert USN-3288-1 (libytnef)
From: | Marc Deslauriers <marc.deslauriers@canonical.com> | |
To: | ubuntu-security-announce@lists.ubuntu.com | |
Subject: | [USN-3288-1] libytnef vulnerabilities | |
Date: | Mon, 15 May 2017 13:33:10 -0400 | |
Message-ID: | <3513c866-f480-074f-214f-de58283cb518@canonical.com> |
========================================================================== Ubuntu Security Notice USN-3288-1 May 15, 2017 libytnef vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS Summary: libytnef could be made to crash or run programs as your login if it opened a specially crafted file. Software Description: - libytnef: improved decoder for application/ms-tnef attachments Details: It was discovered that libytnef incorrectly handled malformed TNEF streams. If a user were tricked into opening a specially crafted TNEF attachment, an attacker could cause a denial of service or possibly execute arbitrary code. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: libytnef0 1.5-6ubuntu0.1 After a standard system update you need to restart applications using libytnef, such as Evolution, to make all the necessary changes. References: http://www.ubuntu.com/usn/usn-3288-1 CVE-2017-6298, CVE-2017-6299, CVE-2017-6300, CVE-2017-6301, CVE-2017-6302, CVE-2017-6303, CVE-2017-6304, CVE-2017-6305, CVE-2017-6306, CVE-2017-6800, CVE-2017-6801, CVE-2017-6802 Package Information: https://launchpad.net/ubuntu/+source/libytnef/1.5-6ubuntu0.1 -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...