SB2016092502 - Debian update for unadf
Published: September 25, 2016
Security Bulletin ID
SB2016092502
Severity
High
Patch available
YES
Number of vulnerabilities
2
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Stack-based buffer overflow (CVE-ID: CVE-2016-1243)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists in the extractTree function due to stack-based buffer overflow. A remote attacker can execute arbitrary code via a long pathname.
Successful exploitation of the vulnerability may result in system compromise.
2) Improper input validation (CVE-ID: CVE-2016-1244)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists in the extractTree function due to improper input validation. A remote attacker can trick the victim into opening a specially crafted adf file and execute arbitrary code via shell metacharacters in a directory name.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.