SB2018041708 - Gentoo update for ncurses
Published: April 17, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 12 secuirty vulnerabilities.
1) Stack-based buffer overflow (CVE-ID: CVE-2017-10684)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists in the fmt_entry function of ncurses due to stack-based buffer overflow when handling malicious input. A remote unauthenticated attacker can send a request that submits malicious input, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Use of externally-controlled format string (CVE-ID: CVE-2017-10685)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists in the fmt_entry function due to use of externally-controlled format string. A remote attacker can submit a specially crafted input and execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
3) Improper input validation (CVE-ID: CVE-2017-11112)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the append_acs function of tinfo/parse_entry.c due to an attempted 0xffffffffffffffff access. A remote attacker can cause the service to crash if the terminfo library code is used to process untrusted terminfo data.
4) NULL pointer dereference (CVE-ID: CVE-2017-11113)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the _nc_parse_entry function of tinfo/parse_entry.c due to NULL pointer dereference. A remote attacker can cause the service to crash if the terminfo library code is used to process untrusted terminfo data.
5) Infinite loop (CVE-ID: CVE-2017-13728)
The vulnerability allows a remote attacker to cause Dos condition on the target system.The weakness exists in the next_char function in comp_scan.c due to an infinite loop. A remote attacker can submit a specially crafted input and cause the service to crash.
6) Improper input validation (CVE-ID: CVE-2017-13729)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the _nc_save_str function in alloc_entry.c due to an illegal address access. A remote attacker can cause the service to crash.
7) Improper input validation (CVE-ID: CVE-2017-13730)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the function _nc_read_entry_source() in progs/tic.c due to an illegal address access. A remote attacker can cause the service to crash.
8) Improper input validation (CVE-ID: CVE-2017-13731)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the function postprocess_termcap() in parse_entry.c due to an illegal address access. A remote attacker can cause the service to crash.
9) Improper input validation (CVE-ID: CVE-2017-13732)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the function dump_uses() in progs/dump_entry.c due to an illegal address access. A remote attacker can cause the service to crash.
10) Improper input validation (CVE-ID: CVE-2017-13733)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the fmt_entry function in progs/dump_entry.c due to an illegal address access. A remote attacker can cause the service to crash.
11) Improper input validation (CVE-ID: CVE-2017-13734)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the _nc_safe_strcat function in strings.c due to an illegal address access. A remote attacker can cause the service to crash.
12) Stack-based buffer overflow (CVE-ID: CVE-2017-16879)
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.The weakness exists in the _nc_write_entry function in tinfo/write_entry.c due to stac-based buffer overflow. A remote attacker can submit a specially crafted terminfo file, as demonstrated by tic, trick the victim into opening it, trigger memory corruption and cause the service to crash or execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.