PatchSiren cyber security CVE debrief
CVE-2017-6304 Debian CVE debrief
CVE-2017-6304 affects ytnef and describes an out-of-bounds read in releases before 1.9.1. NVD rates the issue 7.8 (High) with local attack conditions and required user interaction, so systems that process untrusted input through ytnef should treat it as a serious patching priority.
- Vendor
- Debian
- Product
- CVE-2017-6304
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-24
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-24
- Advisory updated
- 2026-05-13
Who should care
Administrators and maintainers running ytnef, especially in packaged Linux distributions; teams that process user-supplied TNEF content; and security owners for email or attachment-processing workflows that depend on ytnef.
Technical summary
The NVD record identifies the weakness as CWE-125 (out-of-bounds read) and gives the CVSS 3.0 vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The CVE description states the issue is present in ytnef before 1.9.1, while the NVD CPE data marks vulnerable ytnef versions through 1.9. The record includes Debian DSA-3846, an Openwall patch discussion, GitHub pull request 27, and an X41 advisory as supporting references for remediation and fix context.
Defensive priority
High priority for any environment that uses ytnef or packages it downstream; patch promptly and reduce exposure to untrusted inputs.
Recommended defensive actions
- Upgrade ytnef to 1.9.1 or later.
- Apply vendor or distribution updates, including Debian security fixes where applicable.
- Review systems that ingest untrusted TNEF content and limit where ytnef is allowed to run.
- Use sandboxing or least-privilege controls around attachment or content conversion workflows.
- Verify packaged builds are not pinned to affected older ytnef releases.
Evidence notes
Primary evidence comes from the official CVE and NVD records. The CVE was published on 2017-02-24, and the NVD entry was modified on 2026-05-13. NVD lists CVSS 7.8 with AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H and maps the weakness to CWE-125. Supporting references in the record include Debian DSA-3846, the Openwall mailing-list patch thread, GitHub pull request 27, a Fedora package announcement, SecurityFocus BID 96423, and the X41 advisory. One nuance to validate in deployments: the textual description says 'before 1.9.1' while the CPE range in NVD ends at 1.9.
Official resources
-
CVE-2017-6304 CVE record
CVE.org
-
CVE-2017-6304 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
- Source reference
-
Mitigation or vendor reference
[email protected] - Patch, Third Party Advisory
CVE published on 2017-02-24; the NVD record was later modified on 2026-05-13.