Lucene search

K
debianDebianDEBIAN:DLA-2983-1:D6823
HistoryApr 17, 2022 - 5:35 a.m.

[SECURITY] [DLA 2983-1] abcm2ps security update

2022-04-1705:35:57
lists.debian.org
31

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

37.0%

From: Anton Gladky <[email protected]>
To: [email protected]
Subject: [SECURITY] [DLA 2983-1] abcm2ps security update


Debian LTS Advisory DLA-2983-1 [email protected]
https://www.debian.org/lts/security/ Anton Gladky
April 16, 2022 https://wiki.debian.org/LTS


Package : abcm2ps
Version : 7.8.9-1+deb9u1
CVE ID : CVE-2018-10753 CVE-2018-10771 CVE-2019-1010069 CVE-2021-32434
CVE-2021-32435 CVE-2021-32436:

Multiple vulnerabilities have been discovered in abcm2ps: program which
translates ABC music description files to PostScript.

CVE-2018-10753

Stack-based buffer overflow in the delayed_output function in music.c
allows remote attackers to cause a denial of service (application crash) or
possibly have unspecified other impact.

CVE-2018-10771

Stack-based buffer overflow in the get_key function in parse.c allows remote
attackers to cause a denial of service (application crash) or possibly have
unspecified other impact.

CVE-2019-1010069

Incorrect access control allows attackers to cause a denial of service via a
crafted file.

CVE-2021-32434

Array overflow when wrong duration in voice overlay.

CVE-2021-32435

Stack-based buffer overflow in the function get_key in parse.c allows remote
attackers to cause a senial of service (DoS) via unspecified vectors.

CVE-2021-32436

Out-of-bounds read in the function write_title() in subs.c allows remote
attackers to cause a denial of service via unspecified vectors.

For Debian 9 stretch, these problems have been fixed in version
7.8.9-1+deb9u1.

We recommend that you upgrade your abcm2ps packages.

For the detailed security status of abcm2ps please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/abcm2ps

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

37.0%