SB2019040517 - OpenSUSE Linux update for libcaca



SB2019040517 - OpenSUSE Linux update for libcaca

Published: April 5, 2019 Updated: September 27, 2022

Security Bulletin ID SB2019040517
Severity
High
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 67% Medium 17% Low 17%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Division by zero (CVE-ID: CVE-2018-20544)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

There is floating point exception at caca/dither.c (function caca_dither_bitmap) in libcaca 0.99.beta19.


2) Integer overflow (CVE-ID: CVE-2018-20545)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

There is an illegal WRITE memory access at common-image.c (function load_image) in libcaca 0.99.beta19 for 4bpp data.


3) Integer overflow (CVE-ID: CVE-2018-20546)

The vulnerability allows a remote non-authenticated attacker to #BASIC_IMPACT#.

There is an illegal READ memory access at caca/dither.c (function get_rgba_default) in libcaca 0.99.beta19 for the default bpp case.


4) Integer overflow (CVE-ID: CVE-2018-20547)

The vulnerability allows a remote non-authenticated attacker to #BASIC_IMPACT#.

There is an illegal READ memory access at caca/dither.c (function get_rgba_default) in libcaca 0.99.beta19 for 24bpp data.


5) Integer overflow (CVE-ID: CVE-2018-20548)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

There is an illegal WRITE memory access at common-image.c (function load_image) in libcaca 0.99.beta19 for 1bpp data.


6) Improper input validation (CVE-ID: CVE-2018-20549)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The vulnerability exists in the caca_file_read function, as defined in the caca/file.c file due to insufficient validation of user-supplied input. A local attacker can execute a file that submits malicious input, trigger an illegal write memory access condition that can be used to cause a DoS condition.


Remediation

Install update from vendor's website.