Vulnerability Description
In ytnef 1.9.3, the SwapWord function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a heap buffer overflow which can be triggered via a crafted file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ytnef Project | Ytnef | 1.9.3 |
| Redhat | Enterprise Linux | 7.0 |
| Fedoraproject | Fedora | 33 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1926965Issue TrackingThird Party Advisory
- https://github.com/Yeraze/ytnef/issues/86ExploitIssue TrackingThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1926965Issue TrackingThird Party Advisory
- https://github.com/Yeraze/ytnef/issues/86ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2021-3404?
CVE-2021-3404 is a vulnerability with a CVSS score of 7.8 (HIGH). In ytnef 1.9.3, the SwapWord function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a heap buffer overflow which can be triggered via a cr...
How severe is CVE-2021-3404?
CVE-2021-3404 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-3404?
Check the references section above for vendor advisories and patch information. Affected products include: Ytnef Project Ytnef, Redhat Enterprise Linux, Fedoraproject Fedora.