SB2018081006 - OpenSUSE Linux update for libsoup



SB2018081006 - OpenSUSE Linux update for libsoup

Published: August 10, 2018

Security Bulletin ID SB2018081006
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

High 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Stack-based buffer overflow (CVE-ID: CVE-2017-2885)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists in the in the libsoup library for GNOME due to improper bounds checking when processing a crafted HTTP request containing chunk encoded data. A remote attacker can send a specially crafted HTTP request, trigger a stack-based buffer overflow condition in the soup_body_input_stream_read_chunked function in the libsoup/soup-body-input-stream.c code and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

2) Out-of-bounds read (CVE-ID: CVE-2018-12910)

The vulnerability allows a remote attacker to obtain potentially sensitive information or cause DoS condition on the target system.

The weakness exists due to insufficient validation of cookie requests. A remote attacker can supply specially crafted cookie request, trigger out-of-bounds memory read and gain access to arbitrary data or cause the service to crash.

Remediation

Install update from vendor's website.