Severity | High |
Patch available | YES |
Number of vulnerabilities | 5 |
CVE ID | CVE-2018-1000877 CVE-2018-1000878 CVE-2019-1000019 CVE-2019-1000020 CVE-2019-18408 |
CWE ID | CWE-415 CWE-416 CWE-125 CWE-400 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #4 is available. |
Vulnerable software |
Opensuse Subscribe
|
Vendor | Novell |
Severity: Low
CVSSv3: 5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C] [PCI]
CVE-ID: CVE-2018-1000877
CWE-ID:
CWE-415 - Double Free
The vulnerability allows a remote attacker to cause DoS condition.
The vulnerability exists due to double-free error in RAR decoder - libarchive/archive_read_support_format_rar.c, parse_codes(), realloc(rar->lzss.window, new_size) with new_size = 0. A remote attacker can trick the victim into opening a specially crafted RAR archive and cause the service to crash.
MitigationUpdate the affected packages.
Opensuse: 15.0
CPE External linkshttps://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
Severity: Low
CVSSv3: 5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C] [PCI]
CVE-ID: CVE-2018-1000878
CWE-ID:
CWE-416 - Use After Free
The vulnerability allows a remote attacker to cause DoS condition.
The vulnerability exists due to use-after-free error in RAR decoder - libarchive/archive_read_support_format_rar.c. A remote attacker can trick the victim into opening a specially crafted RAR archive and cause the service to crash.
MitigationUpdate the affected packages.
Opensuse: 15.0
CPE External linkshttps://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
Severity: Medium
CVSSv3: 5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C] [PCI]
CVE-ID: CVE-2019-1000019
CWE-ID:
CWE-125 - Out-of-bounds Read
The vulnerability allows a remote attacker to perform denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in the header_bytes() function in archive_read_support_format_7zip.c when decompressing 7zip archives. A remote attacker can create a specially crafted 7zip file, trick the victim into opening it, trigger out-of-bounds read error and crash the affected application.
MitigationUpdate the affected packages.
Opensuse: 15.0
CPE External linkshttps://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
Severity: Medium
CVSSv3: 5.9 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C] [PCI]
CVE-ID: CVE-2019-1000020
CWE-ID:
CWE-400 - Uncontrolled Resource Consumption ('Resource Exhaustion')
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper parsing of ISO9660 files. A remote attacker can persuade a user to access an ISO9660, trigger an infinite loop condition and perform a denial of service (DoS) attack.
MitigationUpdate the affected packages.
Opensuse: 15.0
CPE External linkshttps://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
Severity: High
CVSSv3: 8.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]
CVE-ID: CVE-2019-18408
CWE-ID:
CWE-416 - Use After Free
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the archive_read_format_rar_read_data() function in archive_read_support_format_rar.c in libarchive when handling certain ARCHIVE_FAILED situation, related to Ppmd7_DecodeSymbol. A remote attacker can create a specially crafted archive, pass it to the affected application trigger a use-after-free error and crash the application or execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate the affected packages.
Opensuse: 15.0
CPE External linkshttps://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.