Updated libofx packages fix security vulnerabilities
Publication date: 30 Apr 2018Modification date: 30 Apr 2018
Type: security
Affected Mageia releases : 6
CVE: CVE-2017-2816 , CVE-2017-2920 , CVE-2017-14731
Description
An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability (CVE-2017-2816). An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability (CVE-2017-2920). ofx_proc_file in ofx_preproc.cpp in LibOFX 0.9.12 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file, as demonstrated by an ofxdump call (CVE-2017-14731).
References
- https://bugs.mageia.org/show_bug.cgi?id=22878
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/O2W5PV4QMNKEUZEPKO2GNBDRLIDSVDZM/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2816
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2920
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14731
SRPMS
6/core
- libofx-0.9.10-2.mga6