ESB-2017.2114 - [FreeBSD] pspp: Denial of service - Remote/unauthenticated 2017-08-23

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.2114
                     pspp -- multiple vulnerabilities
                              23 August 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           pspp
Publisher:         FreeBSD
Operating System:  FreeBSD
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-12961 CVE-2017-12960 CVE-2017-12959
                   CVE-2017-12958 CVE-2017-10792 CVE-2017-10791

Reference:         ESB-2017.0273

Original Bulletin: 
   http://www.vuxml.org/freebsd/6876b163-8708-11e7-8568-e8e0b747a45a.html

- --------------------------BEGIN INCLUDED TEXT--------------------

pspp -- multiple vulnerabilities

Affected packages

pspp < 1.0.0

Details

VuXML ID 6876b163-8708-11e7-8568-e8e0b747a45a

Discovery 2017-08-18

Entry 2017-08-22

CVE Details reports:

There is an Integer overflow in the hash_int function of the libpspp library 
in GNU PSPP 0.10.5-pre2 (CVE-2017-10791).

There is a NULL Pointer Dereference in the function ll_insert() of the libpspp
library in GNU PSPP 0.10.5-pre2 (CVE-2017-10792).

There is an illegal address access in the function output_hex() in 
data/data-out.c of the libpspp library in GNU PSPP 0.11.0 that will lead to 
remote denial of service (CVE-2017-12958).

There is a reachable assertion abort in the function dict_add_mrset() in 
data/dictionary.c of the libpspp library in GNU PSPP 0.11.0 that will lead to
a remote denial of service attack (CVE-2017-12959).

There is a reachable assertion abort in the function dict_rename_var() in 
data/dictionary.c of the libpspp library in GNU PSPP 0.11.0 that will lead to
remote denial of service (CVE-2017-12960).

There is an assertion abort in the function parse_attributes() in 
data/sys-file-reader.c of the libpspp library in GNU PSPP 0.11.0 that will 
lead to remote denial of service (CVE-2017-12961).

References

CVE Name CVE-2017-10791

CVE Name CVE-2017-10792

CVE Name CVE-2017-12958

CVE Name CVE-2017-12959

CVE Name CVE-2017-12960

CVE Name CVE-2017-12961

URL 
https://www.cvedetails.com/vulnerability-list/vendor_id-72/product_id-38732/year-2017/GNU-Pspp.html

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=qrrg
-----END PGP SIGNATURE-----

« Back to bulletins