Lucene search

K
osvGoogleOSV:DSA-3725-1
HistoryNov 27, 2016 - 12:00 a.m.

icu - security update

2016-11-2700:00:00
Google
osv.dev
5

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

Several vulnerabilities were discovered in the International Components
for Unicode (ICU) library.

  • CVE-2014-9911
    Michele Spagnuolo discovered a buffer overflow vulnerability which
    might allow remote attackers to cause a denial of service or possibly
    execute arbitrary code via crafted text.
  • CVE-2015-2632
    An integer overflow vulnerability might lead into a denial of service
    or disclosure of portion of application memory if an attacker has
    control on the input file.
  • CVE-2015-4844
    Buffer overflow vulnerabilities might allow an attacker with control
    on the font file to perform a denial of service or,
    possibly, execute arbitrary code.
  • CVE-2016-0494
    Integer signedness issues were introduced as part of the
    CVE-2015-4844 fix.
  • CVE-2016-6293
    A buffer overflow might allow an attacker to perform a denial of
    service or disclosure of portion of application memory.
  • CVE-2016-7415
    A stack-based buffer overflow might allow an attacker with control on
    the locale string to perform a denial of service and, possibly,
    execute arbitrary code.

For the stable distribution (jessie), these problems have been fixed in
version 52.1-8+deb8u4.

For the unstable distribution (sid), these problems have been fixed in
version 57.1-5.

We recommend that you upgrade your icu packages.

CPENameOperatorVersion
icueq52.1-8
icueq52.1-8+deb8u3
icueq52.1-8+deb8u2

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C