Description
In tnef before 1.4.18, an attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message with a crafted winmail.dat application/ms-tnef attachment, because of a heap-based buffer over-read involving strdup.
References (7)
Core 7
Core References
Exploit, Patch, Third Party Advisory x_refsource_misc
https://github.com/verdammelt/tnef/pull/40
Patch, Third Party Advisory x_refsource_misc
https://github.com/verdammelt/tnef/compare/1.4.17...1.4.18
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2019/11/msg00035.html
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RMKFSHPMOZL7MDWU5RYOTIBTRWSZ4Z6X/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7CPKBW4QZ4VIY4UXIUVUSHRJ4R2FROE/
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/4524-1/
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/08/msg00025.html
Scores
CVSS v3
5.5
EPSS
0.0102
EPSS Percentile
77.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (5)
canonical/ubuntu_linux
16.04
debian/debian_linux
8.0
fedoraproject/fedora
30
fedoraproject/fedora
31
tnef_project/tnef
< 1.4.18
Published
Nov 11, 2019
Tracked Since
Feb 18, 2026