SB2018122503 - Denial of service in GNU Libextractor
Published: December 25, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Out-of-bounds read (CVE-ID: CVE-2018-20430)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to out-of-bounds read in the function history_extract() in plugins/ole2_extractor.c, related to EXTRACTOR_common_convert_to_utf8 in common/convert.c. A remote attacker can perform a denial of service (DoS) attack.
2) NULL pointer dereference (CVE-ID: CVE-2018-20431)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dreference error in the function process_metadata() in plugins/ole2_extractor.c. A remote attacker can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://gnunet.org/bugs/view.php?id=5493
- https://gnunet.org/git/libextractor.git/commit/?id=b405d707b36e0654900cba78e89f49779efea110
- https://gnunet.org/git/libextractor.git/tree/ChangeLog
- https://gnunet.org/bugs/view.php?id=5494
- https://gnunet.org/git/libextractor.git/commit/?id=489c4a540bb2c4744471441425b8932b97a153e7