ESB-2018.2614 - [UNIX/Linux][Debian] lcms2: Execute arbitrary code/commands - Remote with user interaction 2018-09-05

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.2614
                           lcms2 security update
                             5 September 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           lcms2
Publisher:         Debian
Operating System:  Debian GNU/Linux
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-16435  

Original Bulletin: 
   http://www.debian.org/security/2018/dsa-4284

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running lcms2 check for an updated version of the software for their
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4284-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
September 04, 2018                    https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : lcms2
CVE ID         : CVE-2018-16435

Quang Nguyen discovered an integer overflow in the Little CMS 2 colour
management library, which could in denial of service and potentially the
execution of arbitrary code if a malformed IT8 calibration file is
processed.

For the stable distribution (stretch), this problem has been fixed in
version 2.8-4+deb9u1.

We recommend that you upgrade your lcms2 packages.

For the detailed security status of lcms2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/lcms2

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=X8Yc
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=pe57
-----END PGP SIGNATURE-----

« Back to bulletins