From 345a996d53ef084212aa1661f76f13fd99843b74 Mon Sep 17 00:00:00 2001 From: decalage2 Date: Tue, 11 Apr 2017 22:34:21 +0200 Subject: [PATCH] rtfobj: added detection of the OLE2Link vulnerability CVE-2017-0199 --- oletools/rtfobj.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/oletools/rtfobj.py b/oletools/rtfobj.py index 080be77..bbe1e71 100644 --- a/oletools/rtfobj.py +++ b/oletools/rtfobj.py @@ -69,7 +69,7 @@ http://www.decalage.info/python/oletools # - fixed hex decoding bug in RtfObjParser (issue #103) # 2017-03-29 PL: - fixed RtfParser to handle issue #152 (control word with # long parameter) -# 2017-04-11 PL: - added detection of the OLE2Link vulnerability +# 2017-04-11 PL: - added detection of the OLE2Link vulnerability CVE-2017-0199 __version__ = '0.51dev5' @@ -716,7 +716,7 @@ def process_file(container, filename, data, output_dir=None, save_object=False): # http://www.kb.cert.org/vuls/id/921560 if rtfobj.class_name == 'OLE2Link': ole_color = 'red' - ole_column += '\nPossibly an exploit for the OLE2Link vulnerability (VU#921560, CVE-2017-TODO)' + ole_column += '\nPossibly an exploit for the OLE2Link vulnerability (VU#921560, CVE-2017-0199)' else: pkg_column = '' ole_column = 'Not a well-formed OLE object' -- libgit2 0.21.4