9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.008 Low
EPSS
Percentile
81.2%
Issue Overview:
Vulnerabilities in the Graphite 2 library (MFSA 2017-16)
A heap-based buffer overflow flaw related to “lz4::decompress” has been reported in graphite2. An attacker could exploit this issue to cause a crash or, possibly, execute arbitrary code. (CVE-2017-7778)
Heap-buffer-overflow write “lz4::decompress” (src/Decompressor)
A heap-based buffer overflow flaw related to “lz4::decompress” (src/Decompressor) has been reported in graphite2. An attacker could exploit this issue to cause a crash or, possibly, execute arbitrary code. (CVE-2017-7772)(CVE-2017-7773)
Out of bounds read in “graphite2::Pass::readPass”:
An out of bounds read flaw related to “graphite2::Pass::readPass” has been reported in graphite2. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash. (CVE-2017-7771)
Heap-buffer-overflow read “graphite2::Silf::getClassGlyph”
An out of bounds read flaw related to “graphite2::Silf::getClassGlyph” has been reported in graphite2. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash.(CVE-2017-7776)
Use of uninitialized memory “graphite2::GlyphCache::Loader::read_glyph”:
The use of uninitialized memory related to “graphite2::GlyphCache::Loader::read_glyph” has been reported in graphite2. An attacker could possibly exploit this flaw to negatively impact the execution of an application using graphite2 in unknown ways. (CVE-2017-7777)
Out of bounds read “graphite2::Silf::readGraphite”
An out of bounds read flaw related to “graphite2::Silf::readGraphite” has been reported in graphite2. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash. (CVE-2017-7774)
Assertion error “size() > n”:
An assertion error has been reported in graphite2. An attacker could possibly exploit this flaw to cause an application crash. (CVE-2017-7775)
Affected Packages:
graphite2
Issue Correction:
Run yum update graphite2 to update your system.
New Packages:
i686:
graphite2-devel-1.3.10-1.7.amzn1.i686
graphite2-1.3.10-1.7.amzn1.i686
graphite2-debuginfo-1.3.10-1.7.amzn1.i686
src:
graphite2-1.3.10-1.7.amzn1.src
x86_64:
graphite2-devel-1.3.10-1.7.amzn1.x86_64
graphite2-debuginfo-1.3.10-1.7.amzn1.x86_64
graphite2-1.3.10-1.7.amzn1.x86_64
Red Hat: CVE-2017-7771, CVE-2017-7772, CVE-2017-7773, CVE-2017-7774, CVE-2017-7775, CVE-2017-7776, CVE-2017-7777, CVE-2017-7778
Mitre: CVE-2017-7771, CVE-2017-7772, CVE-2017-7773, CVE-2017-7774, CVE-2017-7775, CVE-2017-7776, CVE-2017-7777, CVE-2017-7778
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | graphite2-devel | < 1.3.10-1.7.amzn1 | graphite2-devel-1.3.10-1.7.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | graphite2 | < 1.3.10-1.7.amzn1 | graphite2-1.3.10-1.7.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | graphite2-debuginfo | < 1.3.10-1.7.amzn1 | graphite2-debuginfo-1.3.10-1.7.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | graphite2-devel | < 1.3.10-1.7.amzn1 | graphite2-devel-1.3.10-1.7.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | graphite2-debuginfo | < 1.3.10-1.7.amzn1 | graphite2-debuginfo-1.3.10-1.7.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | graphite2 | < 1.3.10-1.7.amzn1 | graphite2-1.3.10-1.7.amzn1.x86_64.rpm |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.008 Low
EPSS
Percentile
81.2%