ESB-2018.3618 - [Win][UNIX/Linux][Debian] uriparser: Multiple vulnerabilities 2018-11-21

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.3618
                         uriparser security update
                             21 November 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           uriparser
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Unknown/Unspecified
                   Denial of Service               -- Unknown/Unspecified
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-19200 CVE-2018-19199 CVE-2018-19198

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2018/11/msg00019.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running uriparser check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

Package        : uriparser
Version        : 0.8.0.1-2+deb8u1
CVE ID         : CVE-2018-19198 CVE-2018-19199 CVE-2018-19200


Multiple vulnerabilities have been discovered in uriparser, an Uniform Resource
Identifiers (URIs) parsing library.

CVE-2018-19198

    UriQuery.c allows an out-of-bounds write via a uriComposeQuery* or
    uriComposeQueryEx* function because the '&' character is mishandled in
    certain contexts.

CVE-2018-19199

    UriQuery.c allows an integer overflow via a uriComposeQuery* or
    uriComposeQueryEx* function because of an unchecked multiplication.

CVE-2018-19200

    UriCommon.c allows attempted operations on NULL input via a uriResetUri*
    function.

For Debian 8 "Jessie", these problems have been fixed in version
0.8.0.1-2+deb8u1.

We recommend that you upgrade your uriparser packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=jdK6
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=XgcQ
-----END PGP SIGNATURE-----

« Back to bulletins