ESB-2018.1166 - [UNIX/Linux][Debian] r-cran-readxl: Execute arbitrary code/commands - Remote with user interaction 2018-04-17

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.1166
                       r-cran-readxl security update
                               17 April 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           r-cran-readxl
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-12111 CVE-2017-12110 CVE-2017-2919
                   CVE-2017-2897 CVE-2017-2896 

Original Bulletin: 
   http://www.debian.org/security/2018/dsa-4173

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running r-cran-readxl check for an updated version of the software 
         for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4173-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
April 16, 2018                        https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : r-cran-readxl
CVE ID         : CVE-2017-2896 CVE-2017-2897 CVE-2017-2919 CVE-2017-12110 
                 CVE-2017-12111

Marcin Noga discovered multiple vulnerabilities in readxl, a GNU R
package to read Excel files (via the integrated libxls library), which
could result in the execution of arbitrary code if a malformed
spreadsheet is processed.

For the stable distribution (stretch), these problems have been fixed in
version 0.1.1-1+deb9u1.

We recommend that you upgrade your r-cran-readxl packages.

For the detailed security status of r-cran-readxl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/r-cran-readxl

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlrU8jcACgkQEMKTtsN8
Tjb54RAAqS5BWcANJ9Y3cGTV7PU81OTLc2ZOjPga3nXpnvyOdpaKHLIIeuN1pJEo
GYm9HxklsnQFMXMoY6g1QCd6NXPCSigpKaVpa8HM9E+Iln14C0may+mA/KEoQFCi
RzicV96RAzxit2z+iaSgkLV7QVIUsB5NlwAcGfy11SDYQZ0L9ztZUfRN0okBtbWZ
FThj5mg0ma0OHfKpCrhVcAuASOh3qRp7uWO3CwHLqa8Mgcg2TlgkjDn7UJ7aUfrf
nbrbJg4OkwWJx2Gwed+cSrfuKl929TiAkOlETprX0GJ314ul+KgqLtbnZ4L2xmD8
sDegbfYNQUhthPLfYXs7UoRFnGwUUwDM1h3Pvdmjaq2QY8wg++nPT/79i3xLK/XT
gDG5ejSLCWvq4IN7Red0/G5UaLfrX7kO9ye8WWNxNHKqr+6pE72DQ9Vb9GcDWWtn
Gi9e1wYvRde+jgZELup5O+jErYvcTSZVu3+e0EuQCWhpP9NoTt6jszdK0k1dR76v
CqZB1k+RpR8HgdNB382MSCuaAIYM7vteAVC/L/dNLFwlHyP0sZVl83wB0fxfTLNt
c8TE+UOws1QWLCqMPPATTtQEQskcRn/qS88XFgMbrnWY9wcEvdk+7Q6v0wfYJITU
9phFNKWNmYgd/Kxwq6KNak/9PcVSLugzm5k+HPLvrEtUQ/8gcLg=
=DzaJ
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=HLJW
-----END PGP SIGNATURE-----

« Back to bulletins