Lucene search

K
gentooGentoo FoundationGLSA-201803-13
HistoryMar 26, 2018 - 12:00 a.m.

PLIB: User-assisted execution of arbitrary code

2018-03-2600:00:00
Gentoo Foundation
security.gentoo.org
20

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.177

Percentile

96.2%

Background

PLIB includes sound effects, music, a complete 3D engine, font rendering, a simple Windowing library, a game scripting language, a GUI, networking, 3D math library and a collection of handy utility functions.

Description

A stack-based buffer overflow within the error function of ssg/ssgParser.cxx was discovered in PLIB.

Impact

A remote attacker, by enticing a user to open a specially crafted 3d model file, could possibly execute arbitrary code with the privileges of the process.

Workaround

There is no known workaround at this time.

Resolution

All PLIB users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/plib-1.8.5-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/plib< 1.8.5-r1UNKNOWN

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.177

Percentile

96.2%