Lucene search

K
debianDebianDEBIAN:DSA-3551-1:CC4C6
HistoryApr 16, 2016 - 9:21 p.m.

[SECURITY] [DSA 3551-1] fuseiso security update

2016-04-1621:21:43
lists.debian.org
6

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

80.7%


Debian Security Advisory DSA-3551-1 [email protected]
https://www.debian.org/security/ Florian Weimer
April 16, 2016 https://www.debian.org/security/faq


Package : fuseiso
CVE ID : CVE-2015-8836 CVE-2015-8837
Debian Bug : 779047

It was discovered that fuseiso, a user-space implementation of the
ISO 9660 file system based on FUSE, contains several vulnerabilities.

CVE-2015-8836

A stack-based buffer overflow may allow attackers who can trick a
user into mounting a crafted ISO 9660 file system to cause a
denial of service (crash), or, potentially, execute arbitrary
code.

CVE-2015-8837

An integer overflow leads to a heap-based buffer overflow, which
allows an attacker (who can trick a user into mounting a crafted
ISO 9660 file system) to cause a denial of service (crash), or,
potentially, execute arbitrary code.

For the oldstable distribution (wheezy), these problems have been fixed
in version 20070708-3+deb7u1.

The stable distribution (jessie) does not contain fuseiso packages.

For the unstable distribution (sid), these problems have been fixed in
version 20070708-3.2.

We recommend that you upgrade your fuseiso packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

80.7%