ESB-2018.3664.2 - UPDATE [Linux][Debian] keepalived: Execute arbitrary code/commands - Remote/unauthenticated 2018-11-27

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2018.3664.2
                  [DLA-1589-1] keepalived security update
                             27 November 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           keepalived
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   Linux variants
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-19115  

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2018/11/msg00034.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running keepalived check for an updated version of the software for
         their operating system.
         
         While the package listed in the advisory from Debian is "icecast2" we
         believe this is a mistake and should be "keepalived".

Revision History:  November 27 2018: Fixed title and product tags
                   November 27 2018: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : icecast2
Version        : 1:1.2.13-1+deb8u1
CVE ID         : CVE-2018-19115
Debian Bug     : 914393


keepalived has a heap-based buffer overflow when parsing HTTP status
codes resulting in DoS or possibly unspecified other impact, because
extract_status_code in lib/html.c has no validation of the status code
and instead writes an unlimited amount of data to the heap.

For Debian 8 "Jessie", this problem has been fixed in version
1:1.2.13-1+deb8u1.

We recommend that you upgrade your keepalived packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=zf3/
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=jfoR
-----END PGP SIGNATURE-----

« Back to bulletins