SB2017092304 - Slackware Linux update for python



SB2017092304 - Slackware Linux update for python

Published: September 23, 2017

Security Bulletin ID SB2017092304
Severity
Critical
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 25% Low 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Buffer overflow in Tenable Nessus (CVE-ID: CVE-2016-0718)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malformed input documents. A remote unauthenticated attacker can trigger a buffer overflow in the Expat XML parser library and execute arbitrary code by sending specially crafted data to vulnerable server.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) XXE attack (CVE-ID: CVE-2016-4472)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to the overflow protection in Expat is removed by compilers with certain optimization settings. A remote attacker can supply specially crafted XML data and cause the service to crash.

The vulnerability exists due to incomplete fix for CVE-2015-1283 and CVE-2015-2716.

3) Integer overflow (CVE-ID: CVE-2016-9063)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to an integer overflow when handling malicious XML files. A remote attacker can send manipulated XML content, trick the victim into opening it and cause the application using the Expat library to crash.

Successful exploitation of the vulnerability results in denial of service.

4) Improper Restriction of XML External Entity Reference (CVE-ID: CVE-2017-9233)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an error within entityValueInitProcessor() function while parsing malformed XML in an external entity. An attacker can take advantage of this flaw to cause a denial of service against an application using the Expat library.

Successful exploitation of the vulnerability may allow an attacker to perform a denial of service attack.

Remediation

Install update from vendor's website.