[ASA-201802-9] libmspack: multiple issues

Levente Polyak anthraxx at archlinux.org
Wed Feb 21 15:28:01 UTC 2018


Arch Linux Security Advisory ASA-201802-9
=========================================

Severity: Critical
Date    : 2018-02-20
CVE-ID  : CVE-2017-6419 CVE-2017-11423
Package : libmspack
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-603

Summary
=======

The package libmspack before version 1:0.6alpha-1 is vulnerable to
multiple issues including arbitrary code execution and denial of
service.

Resolution
==========

Upgrade to 1:0.6alpha-1.

# pacman -Syu "libmspack>=1:0.6alpha-1"

The problems have been fixed upstream in version 0.6alpha.

Workaround
==========

None.

Description
===========

- CVE-2017-6419 (arbitrary code execution)

mspack/lzxd.c in libmspack 0.5alpha, as used in ClamAV before 0.99.3,
allows remote attackers to cause a denial of service (heap-based buffer
overflow and application crash) or possibly execute arbitrary code via
a crafted CHM file.

- CVE-2017-11423 (denial of service)

The cabd_read_string function in mspack/cabd.c in libmspack 0.5alpha,
as used in ClamAV before 0.99.3  and other products, allows remote
attackers to cause a denial of service (stack-based buffer over-read
and application crash) via a crafted CAB file.

Impact
======

A remote attacker is able to crash the application or execute arbitrary
code by providing a maliciously-crafted file.

References
==========

https://bugzilla.clamav.net/show_bug.cgi?id=11701
https://github.com/vrtadmin/clamav-devel/commit/a83773682e856ad6529ba6db8d1792e6d515d7f1
https://github.com/kyz/libmspack/commit/6139a0b9e93fcb7fcf423e56aa825bc869e02229
https://bugzilla.clamav.net/show_bug.cgi?id=11873
https://github.com/kyz/libmspack/commit/17038206fcc384dcee6dd9e3a75f08fd3ddc6a38
https://github.com/vrtadmin/clamav-devel/commit/ffa31264a657618a0e40c51c01e4bfc32e244d13
https://github.com/vrtadmin/clamav-devel/commit/ada5f94e5cfb04e1ac2a6f383f2184753f475b96
https://github.com/hackerlib/hackerlib-vul/tree/master/clamav-vul
https://security.archlinux.org/CVE-2017-6419
https://security.archlinux.org/CVE-2017-11423

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 866 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20180221/e4f22a0c/attachment.asc>


More information about the arch-security mailing list