Lucene search

K
debianDebianDEBIAN:DLA-3675-1:D6BF7
HistoryDec 01, 2023 - 10:30 a.m.

[SECURITY] [DLA 3675-1] zbar security update

2023-12-0110:30:42
lists.debian.org
6
cve-2023-40890
barcode
zbar
qrcode
stack overflow
vulnerability
arbitrary code execution
cve-2023-40889
heap-based buffer overflow
scanner
debian lts
debian 10 buster
information disclosure
security update

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.5%


Debian LTS Advisory DLA-3675-1 [email protected]
https://www.debian.org/lts/security/ Bastien Roucariès
November 30, 2023 https://wiki.debian.org/LTS


Package : zbar
Version : 0.22-1+deb10u1
CVE ID : CVE-2023-40889 CVE-2023-40890
Debian Bug : 1051724

zbar, a barcode and qrcode scanner was vulnerable.

CVE-2023-40889

A heap-based buffer overflow existed
in the qr_reader_match_centers function.
Specially crafted QR codes may lead to information disclosure
and/or arbitrary code execution. To trigger this
vulnerability, an attacker can digitally input the
malicious QR code, or prepare it to be physically scanned
by the vulnerable scanner.

CVE-2023-40890

A stack overflow was present in lookup_sequence
function. Specially crafted QR codes may lead
to information disclosure and/or arbitrary code execution.
To trigger this vulnerability, an attacker can digitally input
the malicious QR code, or prepare it to be physically scanned
by the vulnerable scanner.

For Debian 10 buster, these problems have been fixed in version
0.22-1+deb10u1.

We recommend that you upgrade your zbar packages.

For the detailed security status of zbar please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/zbar

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.5%