SB2017071606 - Fedora EPEL 6 update for yara
Published: July 16, 2017 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2017-11328)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
Heap buffer overflow in the yr_object_array_set_item() function in object.c in YARA 3.x allows a denial-of-service attack by scanning a crafted .NET file.
2) Uncontrolled Recursion (CVE-ID: CVE-2017-9304)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
libyara/re.c in the regexp module in YARA 3.5.0 allows remote attackers to cause a denial of service (stack consumption) via a crafted rule that is mishandled in the _yr_re_emit function.
3) Out-of-bounds read (CVE-ID: CVE-2017-9465)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in The yr_arena_write_data function in YARA 3.6.1. A remote attacker can perform a denial of service (buffer over-read and application crash) or obtain sensitive information from process memory via a crafted file that is mishandled in the yr_re_fast_exec function in libyara/re.c and the _yr_scan_match_callback function in libyara/scan.c.
4) Uncontrolled Recursion (CVE-ID: CVE-2017-9438)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
libyara/re.c in the regexp module in YARA 3.5.0 allows remote attackers to cause a denial of service (stack consumption) via a crafted rule (involving hex strings) that is mishandled in the _yr_re_emit function, a different vulnerability than CVE-2017-9304.
5) Use-after-free (CVE-ID: CVE-2017-8929)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing a crafted rule. A remote attackers can cause a denial of service (use-after-free and application crash).
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Remediation
Install update from vendor's website.