Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/libytnef@1.9.3-1?distro=trixie
purl pkg:deb/debian/libytnef@1.9.3-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (9)
Vulnerability Summary Aliases
VCID-21bd-whcr-ekgv In ytnef 1.9.2, a heap-based buffer overflow vulnerability was found in the function TNEFFillMapi in ytnef.c, which allows attackers to cause a denial of service via a crafted file. CVE-2017-12141
VCID-2zd4-eyeq-27dd In ytnef 1.9.2, the SwapWord function in lib/ytnef.c allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. CVE-2017-9471
VCID-8esx-t2u5-e3hq The TNEFFillMapi function in lib/ytnef.c in libytnef in ytnef through 1.9.2 does not ensure a nonzero count value before a certain memory allocation, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted tnef file. CVE-2017-9146
VCID-efxj-4v6j-fbaa In ytnef 1.9.2, the DecompressRTF function in lib/ytnef.c allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. CVE-2017-9474
VCID-nrgn-8ky2-pyec In ytnef 1.9.2, an invalid memory read vulnerability was found in the function SwapDWord in ytnef.c, which allows attackers to cause a denial of service via a crafted file. CVE-2017-12142
VCID-qkuz-r9a9-vqbx In ytnef 1.9.2, the SwapDWord function in lib/ytnef.c allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. CVE-2017-9472
VCID-sag4-mswc-hbg5 In ytnef 1.9.2, the TNEFFillMapi function in lib/ytnef.c allows remote attackers to cause a denial of service (memory consumption) via a crafted file. CVE-2017-9473
VCID-uar8-sxnf-efhs In ytnef 1.9.2, an allocation failure was found in the function TNEFFillMapi in ytnef.c, which allows attackers to cause a denial of service via a crafted file. CVE-2017-12144
VCID-ujwn-5uux-gygu In ytnef 1.9.2, the MAPIPrint function in lib/ytnef.c allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file. CVE-2017-9470

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:28:24.050686+00:00 Debian Importer Fixing VCID-uar8-sxnf-efhs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:18:43.417405+00:00 Debian Importer Fixing VCID-21bd-whcr-ekgv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:06:50.638233+00:00 Debian Importer Fixing VCID-sag4-mswc-hbg5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:10:01.639235+00:00 Debian Importer Fixing VCID-2zd4-eyeq-27dd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:09:37.805066+00:00 Debian Importer Fixing VCID-qkuz-r9a9-vqbx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:59:24.475501+00:00 Debian Importer Fixing VCID-nrgn-8ky2-pyec https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:55.697003+00:00 Debian Importer Fixing VCID-ujwn-5uux-gygu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:47.550894+00:00 Debian Importer Fixing VCID-8esx-t2u5-e3hq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:58:03.904699+00:00 Debian Importer Fixing VCID-efxj-4v6j-fbaa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:17:49.586143+00:00 Debian Importer Fixing VCID-uar8-sxnf-efhs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:25:16.226683+00:00 Debian Importer Fixing VCID-21bd-whcr-ekgv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:16:56.036083+00:00 Debian Importer Fixing VCID-sag4-mswc-hbg5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:21.728632+00:00 Debian Importer Fixing VCID-2zd4-eyeq-27dd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:03.828310+00:00 Debian Importer Fixing VCID-qkuz-r9a9-vqbx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:27:24.473959+00:00 Debian Importer Fixing VCID-nrgn-8ky2-pyec https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:41.688488+00:00 Debian Importer Fixing VCID-ujwn-5uux-gygu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:17.224469+00:00 Debian Importer Fixing VCID-8esx-t2u5-e3hq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:56.278726+00:00 Debian Importer Fixing VCID-efxj-4v6j-fbaa https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:30:15.933172+00:00 Debian Importer Fixing VCID-efxj-4v6j-fbaa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:30:15.891464+00:00 Debian Importer Fixing VCID-sag4-mswc-hbg5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:30:15.851177+00:00 Debian Importer Fixing VCID-qkuz-r9a9-vqbx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:30:15.810149+00:00 Debian Importer Fixing VCID-2zd4-eyeq-27dd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:30:15.769392+00:00 Debian Importer Fixing VCID-ujwn-5uux-gygu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:30:15.729001+00:00 Debian Importer Fixing VCID-8esx-t2u5-e3hq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:30:15.233252+00:00 Debian Importer Fixing VCID-uar8-sxnf-efhs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:30:15.192713+00:00 Debian Importer Fixing VCID-nrgn-8ky2-pyec https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:30:15.152672+00:00 Debian Importer Fixing VCID-21bd-whcr-ekgv https://security-tracker.debian.org/tracker/data/json 38.1.0