Code execution in E2fsprogs



Published: 2020-01-08
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2019-5188
CWE-ID CWE-787
Exploitation vector Local
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
E2fsprogs
Universal components / Libraries / Libraries used by multiple products

Vendor e2fsprogs.sourceforge.net

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Out-of-bounds write

EUVDB-ID: #VU24078

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-5188

CWE-ID: CWE-787 - Out-of-bounds Write

Exploit availability: No

Description

The vulnerability allows a local user to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in the directory rehashing functionality in "rehash.c" within the "mutate_name()" function. A local user can use a specially crafted ext4 directory, trigger out-of-bounds write on the stack and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

E2fsprogs: 1.43.3 - 1.45.4


CPE2.3 External links

http://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0973

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###