The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.
In tnef before 1.4.18, an attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message with a crafted winmail.dat application/ms-tnef attachment, because of a heap-based buffer over-read involving strdup.
Base Score: 4.3
Impact Score: 2.9
Exploitability Score: 8.6
Base Score: 5.5
Impact Score: 3.6
Exploitability Score: 1.8
|152773||Debian DLA-2748-1 : tnef - LTS security update||Nessus||Debian Local Security Checks|
|140719||Ubuntu 16.04 LTS : TNEF vulnerabilities (USN-4524-1)||Nessus||Ubuntu Local Security Checks|
|131712||Fedora 31 : tnef (2019-815807c020)||Nessus||Fedora Local Security Checks|
|131711||Fedora 30 : tnef (2019-5f14b810f8)||Nessus||Fedora Local Security Checks|
|131430||Debian DLA-2005-1 : tnef security update||Nessus||Debian Local Security Checks|