ASA-201802-9 log original external raw
[ASA-201802-9] libmspack: multiple issues |
---|
Arch Linux Security Advisory ASA-201802-9
=========================================
Severity: Critical
Date : 2018-02-20
CVE-ID : CVE-2017-6419 CVE-2017-11423
Package : libmspack
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-603
Summary
=======
The package libmspack before version 1:0.6alpha-1 is vulnerable to
multiple issues including arbitrary code execution and denial of
service.
Resolution
==========
Upgrade to 1:0.6alpha-1.
# pacman -Syu "libmspack>=1:0.6alpha-1"
The problems have been fixed upstream in version 0.6alpha.
Workaround
==========
None.
Description
===========
- CVE-2017-6419 (arbitrary code execution)
mspack/lzxd.c in libmspack 0.5alpha, as used in ClamAV before 0.99.4,
allows remote attackers to cause a denial of service (heap-based buffer
overflow and application crash) or possibly execute arbitrary code via
a crafted CHM file.
- CVE-2017-11423 (denial of service)
The cabd_read_string function in mspack/cabd.c in libmspack 0.5alpha,
as used in ClamAV before 0.99.4 and other products, allows remote
attackers to cause a denial of service (stack-based buffer over-read
and application crash) via a crafted CAB file.
Impact
======
A remote attacker is able to crash the application or execute arbitrary
code by providing a maliciously-crafted file.
References
==========
https://bugzilla.clamav.net/show_bug.cgi?id=11701
https://github.com/Cisco-Talos/clamav-devel/commit/a83773682e856ad6529ba6db8d1792e6d515d7f1
https://github.com/kyz/libmspack/commit/6139a0b9e93fcb7fcf423e56aa825bc869e02229
https://bugzilla.clamav.net/show_bug.cgi?id=11873
https://github.com/kyz/libmspack/commit/17038206fcc384dcee6dd9e3a75f08fd3ddc6a38
https://github.com/Cisco-Talos/clamav-devel/commit/ffa31264a657618a0e40c51c01e4bfc32e244d13
https://github.com/Cisco-Talos/clamav-devel/commit/ada5f94e5cfb04e1ac2a6f383f2184753f475b96
https://github.com/hackerlib/hackerlib-vul/tree/master/clamav-vul
https://security.archlinux.org/CVE-2017-6419
https://security.archlinux.org/CVE-2017-11423
|