SB2017082818 - Heap-based buffer overflow in a2ps (Alpine package)
Published: August 28, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Heap-based buffer overflow (CVE-ID: CVE-2017-6419)
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.
The weakness exists due to heap-based buffer overflow. A remote attacker can send a specially crafted CHM file, trick the victim into opening it and cause the service to crash or execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=da0d0b246154b83e9095a0067cedf086e9ac8c84
- https://git.alpinelinux.org/aports/commit/?id=287dc987d0bfa340aa510b11e2ad691a15b5ea4e
- https://git.alpinelinux.org/aports/commit/?id=9538615b581d4d5b661a672dc8585be1cb4a3a7f
- https://git.alpinelinux.org/aports/commit/?id=df91fb7832ff98522e5cdd6bf086cd854b7a7046
- https://git.alpinelinux.org/aports/commit/?id=214cb233279c7ef0221557f24d0d0af79a46d3b7
- https://git.alpinelinux.org/aports/commit/?id=3e3519a996d44c6d478d4e1d47cc6360a93da3c3
- https://git.alpinelinux.org/aports/commit/?id=39811d78329ec562d9254e27716bacc363c40d72
- https://git.alpinelinux.org/aports/commit/?id=730cdcef6901750f4029d4c3b8639ce02ee3ead1
- https://git.alpinelinux.org/aports/commit/?id=827fd04bfad64492bbb0e500fd279c4581a71339
- https://git.alpinelinux.org/aports/commit/?id=8bb5cf040a288b92806d60059faa2280eacc51f0
- https://git.alpinelinux.org/aports/commit/?id=a7829dcaaa29a8fac465195f1f1b0d6250ec9560
- https://git.alpinelinux.org/aports/commit/?id=301eedb0a0341293381c93c75ffe85619910bf9a