4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.6 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
45.5%
Package : ming
Version : 1:0.4.4-1.1+deb7u4
CVE ID : CVE-2017-11704 CVE-2017-11728 CVE-2017-11729 CVE-2017-11730
CVE-2017-11731 CVE-2017-11734
Multiple vulnerabilities have been discovered in Ming:
CVE-2017-11704
Heap-based buffer over-read in the function decompileIF in util/decompile.c
in Ming <= 0.4.8, which allows attackers to cause a denial of service via a
crafted file.
CVE-2017-11728
Heap-based buffer over-read in the function OpCode (called from
decompileSETMEMBER) in util/decompile.c in Ming <= 0.4.8, which allows
attackers to cause a denial of service via a crafted file.
CVE-2017-11729
Heap-based buffer over-read in the function OpCode (called from
decompileINCR_DECR line 1440) in util/decompile.c in Ming <= 0.4.8, which
allows attackers to cause a denial of service via a crafted file.
CVE-2017-11730
Heap-based buffer over-read in the function OpCode (called from
decompileINCR_DECR line 1474) in util/decompile.c in Ming <= 0.4.8, which
allows attackers to cause a denial of service via a crafted file.
CVE-2017-11731
Invalid memory read in the function OpCode (called from isLogicalOp and
decompileIF) in util/decompile.c in Ming <= 0.4.8, which allows attackers
to cause a denial of service via a crafted file.
CVE-2017-11734
Heap-based buffer over-read in the function decompileCALLFUNCTION in
util/decompile.c in Ming <= 0.4.8, which allows attackers to cause a denial of
service via a crafted file.
For Debian 7 "Wheezy", these problems have been fixed in version
1:0.4.4-1.1+deb7u4.
We recommend that you upgrade your ming packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | armel | libming-util | < 1:0.4.4-1.1+deb7u4 | libming-util_1:0.4.4-1.1+deb7u4_armel.deb |
Debian | 7 | armhf | libming1 | < 1:0.4.4-1.1+deb7u4 | libming1_1:0.4.4-1.1+deb7u4_armhf.deb |
Debian | 7 | amd64 | php5-ming | < 1:0.4.4-1.1+deb7u4 | php5-ming_1:0.4.4-1.1+deb7u4_amd64.deb |
Debian | 7 | i386 | libming-util | < 1:0.4.4-1.1+deb7u4 | libming-util_1:0.4.4-1.1+deb7u4_i386.deb |
Debian | 7 | i386 | libswf-perl | < 1:0.4.4-1.1+deb7u4 | libswf-perl_1:0.4.4-1.1+deb7u4_i386.deb |
Debian | 7 | armhf | libswf-perl | < 1:0.4.4-1.1+deb7u4 | libswf-perl_1:0.4.4-1.1+deb7u4_armhf.deb |
Debian | 7 | armel | php5-ming | < 1:0.4.4-1.1+deb7u4 | php5-ming_1:0.4.4-1.1+deb7u4_armel.deb |
Debian | 7 | amd64 | python-ming | < 1:0.4.4-1.1+deb7u4 | python-ming_1:0.4.4-1.1+deb7u4_amd64.deb |
Debian | 7 | armhf | libming-util | < 1:0.4.4-1.1+deb7u4 | libming-util_1:0.4.4-1.1+deb7u4_armhf.deb |
Debian | 7 | amd64 | libming1 | < 1:0.4.4-1.1+deb7u4 | libming1_1:0.4.4-1.1+deb7u4_amd64.deb |
4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.6 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
45.5%