SB2019101204 - Fedora EPEL 6 update for yara



SB2019101204 - Fedora EPEL 6 update for yara

Published: October 12, 2019 Updated: April 25, 2025

Security Bulletin ID SB2019101204
Severity
Medium
Patch available
YES
Number of vulnerabilities 8
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 63% Low 38%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 8 secuirty vulnerabilities.


1) NULL pointer dereference (CVE-ID: CVE-2016-10210)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via a crafted rule that is mishandled in the yy_get_next_buffer function.


2) Use-after-free (CVE-ID: CVE-2016-10211)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing a crafted rule that is mishandled in the yr_parser_lookup_loop_variable function. A remote attackers can cause a denial of service (use-after-free and application crash).

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


3) Out-of-bounds read (CVE-ID: CVE-2017-5923)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

libyara/grammar.y in YARA 3.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted rule that is mishandled in the yara_yyparse function.


4) Use-after-free (CVE-ID: CVE-2017-5924)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing a crafted rule that is mishandled in the yr_compiler_destroy function. A remote attackers can cause a denial of service (use-after-free and application crash).

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


5) Uncontrolled Recursion (CVE-ID: CVE-2017-9438)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

libyara/re.c in the regexp module in YARA 3.5.0 allows remote attackers to cause a denial of service (stack consumption) via a crafted rule (involving hex strings) that is mishandled in the _yr_re_emit function, a different vulnerability than CVE-2017-9304.


6) Information disclosure (CVE-ID: CVE-2018-19974)

The vulnerability allows a local attacker to gain access to potentially sensitive information.

The vulnerability exists due to the design of the YARA virtual machine (VM). A local attacker can execute a compiled rule file that submits malicious input and read uninitialized data from VM scratch memory in libyara/exec.c.


7) Information disclosure (CVE-ID: CVE-2018-19975)

The vulnerability allows a local attacker to gain access to potentially sensitive information.

The vulnerability exists due to the design of the YARA virtual machine (VM), which could allow an attacker to use OP_COUNT to read a DWORD value from any arbitrary memory address. A local attacker can execute a compiled rule file that submits malicious input and read data from any arbitrary address in memory, in libyara/exec.c.


8) Information disclosure (CVE-ID: CVE-2018-19976)

The vulnerability allows a local attacker to gain access to potentially sensitive information.

The vulnerability exists due to the design of the YARA virtual machine. A local attacker can execute a compiled rule file that submits malicious input and read uninitialized data from VM scratch memory in libyara/exec.c.


Remediation

Install update from vendor's website.