[arch-security] [ASA-201711-42] lib32-libxcursor: arbitrary code execution
Levente Polyak
anthraxx at archlinux.org
Fri Dec 1 20:29:17 UTC 2017
Arch Linux Security Advisory ASA-201711-42
==========================================
Severity: High
Date : 2017-11-30
CVE-ID : CVE-2017-16612
Package : lib32-libxcursor
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-532
Summary
=======
The package lib32-libxcursor before version 1.1.15-1 is vulnerable to
arbitrary code execution.
Resolution
==========
Upgrade to 1.1.15-1.
# pacman -Syu "lib32-libxcursor>=1.1.15-1"
The problem has been fixed upstream in version 1.1.15.
Workaround
==========
None.
Description
===========
It was discovered that libxcursor before 1.1.15 is vulnerable to heap
overflows due to an integer overflow while parsing images and a
signedness issue while parsing comments. An attacker could use local
privileges or trick a user into parsing a malicious file to cause
libxcursor to crash, resulting in a denial of service, or possibly
execute arbitrary code.
Impact
======
An attacker could use local privileges or trick a user into parsing a
malicious image file to cause libxcursor to crash, resulting in a
denial of service, or possibly execute arbitrary code.
References
==========
http://openwall.com/lists/oss-security/2017/11/28/6
https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=4794b5dd34688158fb51a2943032569d3780c4b8
https://marc.info/?l=freedesktop-xorg-announce&m=151188036018262&w=2
https://security.archlinux.org/CVE-2017-16612
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 866 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20171201/3e2094c2/attachment.asc>
More information about the arch-security
mailing list