Lucene search

K
archlinuxArchLinuxASA-201903-9
HistoryMar 18, 2019 - 12:00 a.m.

[ASA-201903-9] libelf: denial of service

2019-03-1800:00:00
security.archlinux.org
15

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.003 Low

EPSS

Percentile

67.4%

Arch Linux Security Advisory ASA-201903-9

Severity: Medium
Date : 2019-03-18
CVE-ID : CVE-2019-7148 CVE-2019-7149 CVE-2019-7150 CVE-2019-7664
CVE-2019-7665
Package : libelf
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-863

Summary

The package libelf before version 0.176-1 is vulnerable to denial of
service.

Resolution

Upgrade to 0.176-1.

pacman -Syu “libelf>=0.176-1”

The problems have been fixed upstream in version 0.176.

Workaround

None.

Description

  • CVE-2019-7148 (denial of service)

An attempted excessive memory allocation was discovered in the function
read_long_names in elf_begin.c in libelf in elfutils <= 0.175. Remote
attackers could leverage this vulnerability to cause a denial-of-
service via crafted elf input, which leads to an out-of-memory
exception.

  • CVE-2019-7149 (denial of service)

A heap-based buffer over-read was discovered in the function
read_srclines in dwarf_getsrclines.c in libdw in elfutils 0.175. A
crafted input can cause segmentation faults, leading to denial-of-
service.

  • CVE-2019-7150 (denial of service)

An issue was discovered in elfutils 0.175. A segmentation fault can
occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to
dwfl_segment_report_module not checking whether the dyn data read from
a core file is truncated. A crafted input can cause a program crash,
leading to denial-of-service.

  • CVE-2019-7664 (denial of service)

In elfutils 0.175, a negative-sized memcpy is attempted in elf_cvt_note
in libelf/note_xlate.h because of an incorrect overflow check. Crafted
elf input causes a segmentation fault, leading to denial of service
(program crash).

  • CVE-2019-7665 (denial of service)

In elfutils 0.175, a heap-based buffer over-read was discovered in the
function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF
input can cause a segmentation fault leading to denial of service
(program crash) because ebl_core_note does not reject malformed core
file notes.

Impact

A remote attacker is able to crash a program that uses libelf by
providing it with a crafted ELF file.

References

https://sourceware.org/bugzilla/show_bug.cgi?id=24085
https://sourceware.org/bugzilla/show_bug.cgi?id=24102
https://sourceware.org/bugzilla/show_bug.cgi?id=24103
https://sourceware.org/bugzilla/show_bug.cgi?id=24084
https://sourceware.org/ml/elfutils-devel/2019-q1/msg00049.html
https://sourceware.org/bugzilla/show_bug.cgi?id=24089
https://security.archlinux.org/CVE-2019-7148
https://security.archlinux.org/CVE-2019-7149
https://security.archlinux.org/CVE-2019-7150
https://security.archlinux.org/CVE-2019-7664
https://security.archlinux.org/CVE-2019-7665

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanylibelf< 0.176-1UNKNOWN

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.003 Low

EPSS

Percentile

67.4%