#VU11477 Improper input validation in libevt


Published: 2018-04-03

Vulnerability identifier: #VU11477

Vulnerability risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-8754

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
libevt
Universal components / Libraries / Libraries used by multiple products

Vendor: libevt

Description
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.

The weakness exists in the libevt_record_values_read_event() function in libevt_record_values.c due to improper checking of out-of-bounds values of user SID data size, strings size, or data size. A remote attacker can submit a specially crafted EVT file, cause the service to crash or execute arbitrary code.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation
Update to version 20180317.

Vulnerable software versions

libevt: 20170120


External links
http://github.com/libyal/libevt/commit/444ca3ce7853538c577e0ec3f6146d2d65780734


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability