Out-of-bounds read in libidn (Alpine package)



Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2016-6261
CWE-ID CWE-125
Exploitation vector Network
Public exploit N/A
Vulnerable software
IBM Tivoli Storage Manager
Server applications / File servers (FTP/HTTP)

libidn (Alpine package)
Operating systems & Components / Operating system package or component

Vendor IBM Corporation
Alpine Linux Development Team

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Out-of-bounds read

EUVDB-ID: #VU32270

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2016-6261

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Tivoli Storage Manager: 6.1.4

libidn (Alpine package): 2.10.7ubuntu3 - 2.10.26ubuntu3

libidn (Alpine package): 0.57

libidn (Alpine package): 1.5.2-10

libidn (Alpine package): 3.0pl1-115ubuntu1 - 3.0pl1-115

libidn (Alpine package): 5.2.1-2 - 5.93-3

libidn (Alpine package): 0.2.3-1

libidn (Alpine package): 0.9.2

libidn (Alpine package): 0.2.5

libidn (Alpine package): 7.3.0.118

libidn (Alpine package):

libidn (Alpine package): before 1.33-r0

CPE2.3 External links

https://git.alpinelinux.org/aports/commit/?id=6f8194876e62f69016a55f327bebc773747eb8cc
https://git.alpinelinux.org/aports/commit/?id=33d33f1d2d9ecca84f682b2a549435c8b7ed96ea
https://git.alpinelinux.org/aports/commit/?id=8a25e031b07b773c4abdabe2f55faf44b187ea5a
https://git.alpinelinux.org/aports/commit/?id=812e0313b9eac3e50cd03f0dd965957bbe23fcf1
https://git.alpinelinux.org/aports/commit/?id=87698baa9ec19d0554e5233954b6f266efe8b5cd
https://git.alpinelinux.org/aports/commit/?id=bb2a0351e208d64f3b150cd56e320b0f2e74605a
https://git.alpinelinux.org/aports/commit/?id=ffe337c3cad45e1b559788b0f80573a30530d4c1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###