Lucene search

K
centosCentOS ProjectCESA-2018:3327
HistoryNov 15, 2018 - 6:48 p.m.

libmspack security update

2018-11-1518:48:49
CentOS Project
lists.centos.org
64

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.009 Low

EPSS

Percentile

83.1%

CentOS Errata and Security Advisory CESA-2018:3327

The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft.

Security Fix(es):

  • libmspack: off-by-one error in the CHM PMGI/PMGL chunk number validity checks (CVE-2018-14679)

  • libmspack: off-by-one error in the CHM chunk number validity checks (CVE-2018-14680)

  • libmspack: out-of-bounds write in kwajd_read_headers in mspack/kwajd.c (CVE-2018-14681)

  • libmspack: off-by-one error in the TOLOWER() macro for CHM decompression (CVE-2018-14682)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-cr-announce/2018-November/031790.html

Affected packages:
libmspack
libmspack-devel

Upstream details at:
https://access.redhat.com/errata/RHSA-2018:3327

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.009 Low

EPSS

Percentile

83.1%