Lucene search

K
centosCentOS ProjectCESA-2011:1815
HistoryDec 14, 2011 - 12:14 a.m.

icu, libicu security update

2011-12-1400:14:20
CentOS Project
lists.centos.org
48

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.224 Low

EPSS

Percentile

96.5%

CentOS Errata and Security Advisory CESA-2011:1815

The International Components for Unicode (ICU) library provides robust and
full-featured Unicode services.

A stack-based buffer overflow flaw was found in the way ICU performed
variant canonicalization for some locale identifiers. If a
specially-crafted locale representation was opened in an application
linked against ICU, it could cause the application to crash or, possibly,
execute arbitrary code with the privileges of the user running the
application. (CVE-2011-4599)

All users of ICU should upgrade to these updated packages, which contain a
backported patch to resolve this issue. All applications linked against
ICU must be restarted for this update to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2011-December/080485.html
https://lists.centos.org/pipermail/centos-announce/2011-December/080486.html
https://lists.centos.org/pipermail/centos-announce/2011-December/080502.html

Affected packages:
icu
libicu
libicu-devel
libicu-doc

Upstream details at:
https://access.redhat.com/errata/RHSA-2011:1815

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.224 Low

EPSS

Percentile

96.5%