Debian Security Advisory DSA-4095-1 email@example.com https://www.debian.org/security/ Salvatore Bonaccorso January 24, 2018 https://www.debian.org/security/faq
Package : gcab CVE ID : CVE-2018-5345 Debian Bug : 887776
It was discovered that gcab, a Microsoft Cabinet file manipulation tool, is prone to a stack-based buffer overflow vulnerability when extracting .cab files. An attacker can take advantage of this flaw to cause a denial-of-service or, potentially the execution of arbitrary code with the privileges of the user running gcab, if a specially crafted .cab file is processed.
For the stable distribution (stretch), this problem has been fixed in version 0.7-2+deb9u1.
We recommend that you upgrade your gcab packages.
For the detailed security status of gcab please refer to its security tracker page at: https://security-tracker.debian.org/tracker/gcab
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: firstname.lastname@example.org