openSUSE Security Update : libplist (openSUSE-2017-627)

critical Nessus Plugin ID 100502

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for libplist fixes the following issues :

- CVE-2017-5209: The base64decode function in libplist allowed attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via split encoded Apple Property List data (bsc#1019531).

- CVE-2017-5545: The main function in plistutil.c in libimobiledevice libplist allowed attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short. (bsc#1021610).

- CVE-2017-5836: A type inconsistency in bplist.c was fixed. (bsc#1023807)

- CVE-2017-5835: A memory allocation error leading to DoS was fixed. (bsc#1023822)

- CVE-2017-5834: A heap-buffer overflow in parse_dict_node was fixed. (bsc#1023848)

- CVE-2017-6440: Ensure that sanity checks work on 32-bit platforms. (bsc#1029631)

- CVE-2017-7982: Add some safety checks, backported from upstream (bsc#1035312).

- CVE-2017-5836: A maliciously crafted file could cause the application to crash. (bsc#1023807).

- CVE-2017-5835: Malicious crafted file could cause libplist to allocate large amounts of memory and consume lots of CPU (bsc#1023822)

- CVE-2017-5834: Maliciou crafted file could cause a heap buffer overflow or segmentation fault (bsc#1023848) This update was imported from the SUSE:SLE-12-SP2:Update update project.

Solution

Update the affected libplist packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1019531

https://bugzilla.opensuse.org/show_bug.cgi?id=1021610

https://bugzilla.opensuse.org/show_bug.cgi?id=1023807

https://bugzilla.opensuse.org/show_bug.cgi?id=1023822

https://bugzilla.opensuse.org/show_bug.cgi?id=1023848

https://bugzilla.opensuse.org/show_bug.cgi?id=1029631

https://bugzilla.opensuse.org/show_bug.cgi?id=1035312

Plugin Details

Severity: Critical

ID: 100502

File Name: openSUSE-2017-627.nasl

Version: 3.3

Type: local

Agent: unix

Published: 5/30/2017

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libplist%2b%2b-devel, p-cpe:/a:novell:opensuse:libplist%2b%2b3, p-cpe:/a:novell:opensuse:libplist%2b%2b3-32bit, p-cpe:/a:novell:opensuse:libplist%2b%2b3-debuginfo, p-cpe:/a:novell:opensuse:libplist%2b%2b3-debuginfo-32bit, p-cpe:/a:novell:opensuse:libplist-debugsource, p-cpe:/a:novell:opensuse:libplist-devel, p-cpe:/a:novell:opensuse:libplist3, p-cpe:/a:novell:opensuse:libplist3-32bit, p-cpe:/a:novell:opensuse:libplist3-debuginfo, p-cpe:/a:novell:opensuse:libplist3-debuginfo-32bit, p-cpe:/a:novell:opensuse:plistutil, p-cpe:/a:novell:opensuse:plistutil-debuginfo, p-cpe:/a:novell:opensuse:python-plist, p-cpe:/a:novell:opensuse:python-plist-debuginfo, cpe:/o:novell:opensuse:42.2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 5/27/2017

Reference Information

CVE: CVE-2017-5209, CVE-2017-5545, CVE-2017-5834, CVE-2017-5835, CVE-2017-5836, CVE-2017-6440, CVE-2017-7982