SB2021120634 - Ubuntu update for uriparser
Published: December 6, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Out-of-bounds write (CVE-ID: CVE-2018-19198)
The vulnerability allows a local attacker to cause DoS condition or execute arbitrary code on the target system.
The vulnerability exists due to out-of-bounds write in the uriComposeQuery* and uriComposeQueryEx* functions, as defined in the UriQuery.csource code file. A local attacker can send a specially request that submits malicious input, trigger memory corruption to cause a DoS condition or execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
2) Integer overflow (CVE-ID: CVE-2018-19199)
The vulnerability allows a local attacker to cause DoS condition or execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in the uriComposeQuery*and uriComposeQueryEx* functions, as defined in the UriQuery.c source code file. A local attacker can send a specially request that submits malicious input, trigger memory corruption to cause a DoS condition or execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
3) Null pointer dereference (CVE-ID: CVE-2018-19200)
The vulnerability allows a local attacker to cause DoS condition on the target system.
The vulnerability exists in the uriResetUri* function, as defined in the UriCommon.c source code file due to the allowance of operations on a NULL input. A local attacker can send a specially request that submits malicious input, trigger NULL pointer dereference to cause a DoS condition.
4) Out-of-bounds read (CVE-ID: CVE-2018-20721)
The vulnerability allows a remote attacker to gain access to cause DoS condition.
The vulnerability exists in URI_FUNC() in UriParse.c in uriparser due to a boundary condition. A remote attacker can create a specially crafted Excel file, trick the victim into opening it, trigger out-of-bounds read error for an incomplete URI with an IPv6 address containing an embedded IPv4 address, such as a "//[::44.1" address and cause the service to crash.
Remediation
Install update from vendor's website.