Name | CVE-2014-9275 |
Description | UnRTF allows remote attackers to cause a denial of service (out-of-bounds memory access and crash) and possibly execute arbitrary code via a crafted RTF file. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-133-1, DSA-3158-1 |
Debian Bugs | 772811 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
unrtf (PTS) | trixie, sid, bookworm, bullseye | 0.21.10-clean-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://lists.gnu.org/archive/html/bug-unrtf/2014-11/msg00000.html
https://lists.gnu.org/archive/html/bug-unrtf/2014-12/msg00001.html
Patch: https://bitbucket.org/medoc/unrtf-int/commits/1df886f2e65f7c512a6217588ae8d94d4bcbc63d
Patch: https://bitbucket.org/medoc/unrtf-int/commits/3c7ff3f888de0f0d957fe67b6bd4bec9c0d475f3