Ubuntu update for libcdio



Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2017-18198
CVE-2017-18199
CWE-ID CWE-119
CWE-476
Exploitation vector Network
Public exploit N/A
Vulnerable software
Ubuntu
Operating systems & Components / Operating system

libudf0 (Ubuntu package)
Operating systems & Components / Operating system package or component

libiso9660-8 (Ubuntu package)
Operating systems & Components / Operating system package or component

libcdio13 (Ubuntu package)
Operating systems & Components / Operating system package or component

libcdio-utils (Ubuntu package)
Operating systems & Components / Operating system package or component

libcdio-cdda1 (Ubuntu package)
Operating systems & Components / Operating system package or component

libcdio-paranoia1 (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Memory corruption

EUVDB-ID: #VU10824

Risk: Low

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-18198

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the print_iso9660_recurse in iso-info.c due to improper handling of crafted ISO image files. A remote attacker can create a specially crafted ISO file, trick the victim into opening it, trigger memory corruption and cause the service to crash.

Mitigation

Update the affected package libcdio to the latest version.

Vulnerable software versions

Ubuntu: 14.04 - 16.04

libudf0 (Ubuntu package): before 0.834.2ubuntu1+esm1

libiso9660-8 (Ubuntu package): before 0.834.2ubuntu1+esm1

libcdio13 (Ubuntu package): before 0.834.2ubuntu1+esm1

libcdio-utils (Ubuntu package): before 0.834.2ubuntu1+esm1

libcdio-cdda1 (Ubuntu package): before 0.834.2ubuntu1+esm1

libcdio-paranoia1 (Ubuntu package): before 0.834.2ubuntu1+esm1

CPE2.3 External links

https://ubuntu.com/security/notices/USN-5558-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) NULL pointer dereference

EUVDB-ID: #VU10796

Risk: Low

CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-18199

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists in the realloc_symlink function due to improper handling of crafted ISO image files. A remote attacker can create a specially crafted ISO image file, trick the victim into opening it and cause the service to crash.

Mitigation

Update the affected package libcdio to the latest version.

Vulnerable software versions

Ubuntu: 14.04 - 16.04

libudf0 (Ubuntu package): before 0.834.2ubuntu1+esm1

libiso9660-8 (Ubuntu package): before 0.834.2ubuntu1+esm1

libcdio13 (Ubuntu package): before 0.834.2ubuntu1+esm1

libcdio-utils (Ubuntu package): before 0.834.2ubuntu1+esm1

libcdio-cdda1 (Ubuntu package): before 0.834.2ubuntu1+esm1

libcdio-paranoia1 (Ubuntu package): before 0.834.2ubuntu1+esm1

CPE2.3 External links

https://ubuntu.com/security/notices/USN-5558-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###