ESB-2018.3306 - [Win][Linux][Debian] libmspack: Multiple vulnerabilities 2018-10-29

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.3306
                   DLA 1555-1: libmspack security update
                              29 October 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           libmspack
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   Windows
                   Linux variants
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-18585 CVE-2018-18584 

Original Bulletin: 
   https://security-tracker.debian.org/tracker/DLA-1555-1

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running libmspack check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : libmspack
Version        : 0.5-1+deb8u3
CVE ID         : CVE-2018-18584 CVE-2018-18585


CVE-2018-18584
      Fixing the size of the CAB block input buffer, which is too small
      for the maximal Quantum block, prevents an out-of-bounds write.

CVE-2018-18585
      Blank filenames (having length zero or their 1st or 2nd byte is
      null) should be rejected.


For Debian 8 "Jessie", these problems have been fixed in version
0.5-1+deb8u3.

We recommend that you upgrade your libmspack packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=RN1G
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=YYOx
-----END PGP SIGNATURE-----

« Back to bulletins