Lucene search

K
archlinuxArchLinuxASA-201802-9
HistoryFeb 20, 2018 - 12:00 a.m.

[ASA-201802-9] libmspack: multiple issues

2018-02-2000:00:00
security.archlinux.org
9

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.009 Low

EPSS

Percentile

82.6%

Arch Linux Security Advisory ASA-201802-9

Severity: Critical
Date : 2018-02-20
CVE-ID : CVE-2017-6419 CVE-2017-11423
Package : libmspack
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-603

Summary

The package libmspack before version 1:0.6alpha-1 is vulnerable to
multiple issues including arbitrary code execution and denial of
service.

Resolution

Upgrade to 1:0.6alpha-1.

pacman -Syu “libmspack>=1:0.6alpha-1”

The problems have been fixed upstream in version 0.6alpha.

Workaround

None.

Description

  • CVE-2017-6419 (arbitrary code execution)

mspack/lzxd.c in libmspack 0.5alpha, as used in ClamAV before 0.99.3,
allows remote attackers to cause a denial of service (heap-based buffer
overflow and application crash) or possibly execute arbitrary code via
a crafted CHM file.

  • CVE-2017-11423 (denial of service)

The cabd_read_string function in mspack/cabd.c in libmspack 0.5alpha,
as used in ClamAV before 0.99.3 and other products, allows remote
attackers to cause a denial of service (stack-based buffer over-read
and application crash) via a crafted CAB file.

Impact

A remote attacker is able to crash the application or execute arbitrary
code by providing a maliciously-crafted file.

References

https://bugzilla.clamav.net/show_bug.cgi?id=11701
https://github.com/vrtadmin/clamav-devel/commit/a83773682e856ad6529ba6db8d1792e6d515d7f1
https://github.com/kyz/libmspack/commit/6139a0b9e93fcb7fcf423e56aa825bc869e02229
https://bugzilla.clamav.net/show_bug.cgi?id=11873
https://github.com/kyz/libmspack/commit/17038206fcc384dcee6dd9e3a75f08fd3ddc6a38
https://github.com/vrtadmin/clamav-devel/commit/ffa31264a657618a0e40c51c01e4bfc32e244d13
https://github.com/vrtadmin/clamav-devel/commit/ada5f94e5cfb04e1ac2a6f383f2184753f475b96
https://github.com/hackerlib/hackerlib-vul/tree/master/clamav-vul
https://security.archlinux.org/CVE-2017-6419
https://security.archlinux.org/CVE-2017-11423

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanylibmspack< 1:0.6alpha-1UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.009 Low

EPSS

Percentile

82.6%