Improper check or handling of exceptional conditions in linux-firmware (Alpine package)



Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2018-5996
CWE-ID CWE-703
Exploitation vector Network
Public exploit N/A
Vulnerable software
linux-firmware (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Improper check or handling of exceptional conditions

EUVDB-ID: #VU12820

Risk: High

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2018-5996

CWE-ID: CWE-703 - Improper Check or Handling of Exceptional Conditions

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.

The weakness exists in the method NCompress::NRar3::CDecoder::Code due to insufficient exception handling. A remote attacker can trickt eh victim into opening a specially crafted RAR file, trigger multiple memory corruptions within the PPMd code and cause the service to crash or execute arbitrary code.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Install update from vendor's website.

Vulnerable software versions

linux-firmware (Alpine package): All versions

CPE2.3 External links

https://git.alpinelinux.org/aports/commit/?id=8534c21265a404ef97e1d534101899b1abd43fe1
https://git.alpinelinux.org/aports/commit/?id=d2bfb22c8e8f67ad7d8d02704f35ec4d2a19f9b9
https://git.alpinelinux.org/aports/commit/?id=916b50fbdafda4e285e59c6b59805040daee9fce
https://git.alpinelinux.org/aports/commit/?id=960c744d0dfc8cd51a8e1c7399d4b50fc829458b
https://git.alpinelinux.org/aports/commit/?id=dd269d3c71438124e4041c3db6aa73a238dbd4ee
https://git.alpinelinux.org/aports/commit/?id=e6025bbe67127ea00ad61cfc4a208c2a92c56dd3
https://git.alpinelinux.org/aports/commit/?id=363588f828b82c0b7c73dbcd9fa8744640485c69


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###