Lucene search

K
freebsdFreeBSDD1F5E12A-FD5A-11E3-A108-080027EF73EC
HistoryJun 25, 2014 - 12:00 a.m.

LZO -- potential buffer overrun when processing malicious input data

2014-06-2500:00:00
vuxml.freebsd.org
35

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.011 Low

EPSS

Percentile

84.4%

Markus Franz Xaver Johannes Oberhumer reports, in the package’s NEWS file:

Fixed a potential integer overflow condition in the “safe”
decompressor variants which could result in a possible buffer
overrun when processing maliciously crafted compressed input
data.
As this issue only affects 32-bit systems and also can only happen
if you use uncommonly huge buffer sizes where you have to decompress
more than 16 MiB (2^24 bytes) compressed bytes within a single
function call, the practical implications are limited.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchlzo2< 2.07UNKNOWN
FreeBSDanynoarchbusybox< 1.22.1_2UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.011 Low

EPSS

Percentile

84.4%