3 results (0.004 seconds)

CVSS: 7.5EPSS: 5%CPEs: 5EXPL: 1

UnRTF allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code as demonstrated by a file containing the string "{\cb-999999999". UnRTF permite a atacantes remotos causar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario tal y como fue demostrado por un fichero que contenía la cadena '{\cb-999999999'. • http://advisories.mageia.org/MGASA-2014-0533.html http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147399.html http://secunia.com/advisories/62811 http://www.debian.org/security/2015/dsa-3158 http://www.mandriva.com/security/advisories?name=MDVSA-2015:007 http://www.openwall.com/lists/oss-security/2014/12/04/15 http://www.securityfocus.com/bid/71430 https://bugzilla.redhat.com/show_bug.cgi?id=1170233 https://lists.gnu.org/archive/html/bug-unrtf/2014-1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 7%CPEs: 1EXPL: 0

UnRTF allows remote attackers to cause a denial of service (out-of-bounds memory access and crash) and possibly execute arbitrary code via a crafted RTF file. UnRTF permite a atacantes remotos causar una denegación de servicio (acceso a la memoria fuera de rango y caída) y posiblemente ejecutar código arbitrario a través de un fichero RTF manipulado. • http://advisories.mageia.org/MGASA-2014-0533.html http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147399.html http://secunia.com/advisories/62811 http://www.debian.org/security/2015/dsa-3158 http://www.mandriva.com/security/advisories?name=MDVSA-2015:007 http://www.openwall.com/lists/oss-security/2014/12/03/4 http://www.openwall.com/lists/oss-security/2014/12/04/15 http://www.securityfocus.com/bid/71506 https://bugzilla.redhat.com/show_bug.cgi?id&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 3%CPEs: 1EXPL: 1

Buffer overflow in the process_font_table function in convert.c for unrtf 0.19.3 allows remote attackers to execute arbitrary code via a crafted RTF file. Desbordamiento de búfer en la función process_font_table en convert.c de unrtf 0.19.3 permite a atacantes remotos ejecutar código de su elección mediante un fichero RTF artesanal. • http://tigger.uic.edu/~jlongs2/holes/unrtf.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/18566 •