ALT-PU-2014-2455-1
Closed vulnerabilities
Published: 2014-12-09
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2014-9274
UnRTF allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code as demonstrated by a file containing the string "{\cb-999999999".
Severity: HIGH (7.5)
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
References:
- http://advisories.mageia.org/MGASA-2014-0533.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147399.html
- http://secunia.com/advisories/62811
- http://www.debian.org/security/2015/dsa-3158
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:007
- http://www.openwall.com/lists/oss-security/2014/12/04/15
- http://www.securityfocus.com/bid/71430
- https://bugzilla.redhat.com/show_bug.cgi?id=1170233
- https://lists.gnu.org/archive/html/bug-unrtf/2014-11/msg00001.html
- https://security.gentoo.org/glsa/201507-06
- http://advisories.mageia.org/MGASA-2014-0533.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147399.html
- http://secunia.com/advisories/62811
- http://www.debian.org/security/2015/dsa-3158
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:007
- http://www.openwall.com/lists/oss-security/2014/12/04/15
- http://www.securityfocus.com/bid/71430
- https://bugzilla.redhat.com/show_bug.cgi?id=1170233
- https://lists.gnu.org/archive/html/bug-unrtf/2014-11/msg00001.html
- https://security.gentoo.org/glsa/201507-06
Published: 2014-12-09
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2014-9275
UnRTF allows remote attackers to cause a denial of service (out-of-bounds memory access and crash) and possibly execute arbitrary code via a crafted RTF file.
Severity: HIGH (7.5)
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
References:
- http://advisories.mageia.org/MGASA-2014-0533.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147399.html
- http://secunia.com/advisories/62811
- http://www.debian.org/security/2015/dsa-3158
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:007
- http://www.openwall.com/lists/oss-security/2014/12/03/4
- http://www.openwall.com/lists/oss-security/2014/12/04/15
- http://www.securityfocus.com/bid/71506
- https://bugzilla.redhat.com/show_bug.cgi?id=1170233
- https://security.gentoo.org/glsa/201507-06
- http://advisories.mageia.org/MGASA-2014-0533.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147399.html
- http://secunia.com/advisories/62811
- http://www.debian.org/security/2015/dsa-3158
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:007
- http://www.openwall.com/lists/oss-security/2014/12/03/4
- http://www.openwall.com/lists/oss-security/2014/12/04/15
- http://www.securityfocus.com/bid/71506
- https://bugzilla.redhat.com/show_bug.cgi?id=1170233
- https://security.gentoo.org/glsa/201507-06