exploit the possibilities

Debian Security Advisory 4173-1

Debian Security Advisory 4173-1
Posted Apr 16, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4173-1 - Marcin Noga discovered multiple vulnerabilities in readxl, a GNU R package to read Excel files (via the integrated libxls library), which could result in the execution of arbitrary code if a malformed spreadsheet is processed.

tags | advisory, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2017-12110, CVE-2017-12111, CVE-2017-2896, CVE-2017-2897, CVE-2017-2919
MD5 | 8c5188ff11b94b3d16cadc20ec52e684

Debian Security Advisory 4173-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4173-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
April 16, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : r-cran-readxl
CVE ID : CVE-2017-2896 CVE-2017-2897 CVE-2017-2919 CVE-2017-12110
CVE-2017-12111

Marcin Noga discovered multiple vulnerabilities in readxl, a GNU R
package to read Excel files (via the integrated libxls library), which
could result in the execution of arbitrary code if a malformed
spreadsheet is processed.

For the stable distribution (stretch), these problems have been fixed in
version 0.1.1-1+deb9u1.

We recommend that you upgrade your r-cran-readxl packages.

For the detailed security status of r-cran-readxl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/r-cran-readxl

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlrU8jcACgkQEMKTtsN8
Tjb54RAAqS5BWcANJ9Y3cGTV7PU81OTLc2ZOjPga3nXpnvyOdpaKHLIIeuN1pJEo
GYm9HxklsnQFMXMoY6g1QCd6NXPCSigpKaVpa8HM9E+Iln14C0may+mA/KEoQFCi
RzicV96RAzxit2z+iaSgkLV7QVIUsB5NlwAcGfy11SDYQZ0L9ztZUfRN0okBtbWZ
FThj5mg0ma0OHfKpCrhVcAuASOh3qRp7uWO3CwHLqa8Mgcg2TlgkjDn7UJ7aUfrf
nbrbJg4OkwWJx2Gwed+cSrfuKl929TiAkOlETprX0GJ314ul+KgqLtbnZ4L2xmD8
sDegbfYNQUhthPLfYXs7UoRFnGwUUwDM1h3Pvdmjaq2QY8wg++nPT/79i3xLK/XT
gDG5ejSLCWvq4IN7Red0/G5UaLfrX7kO9ye8WWNxNHKqr+6pE72DQ9Vb9GcDWWtn
Gi9e1wYvRde+jgZELup5O+jErYvcTSZVu3+e0EuQCWhpP9NoTt6jszdK0k1dR76v
CqZB1k+RpR8HgdNB382MSCuaAIYM7vteAVC/L/dNLFwlHyP0sZVl83wB0fxfTLNt
c8TE+UOws1QWLCqMPPATTtQEQskcRn/qS88XFgMbrnWY9wcEvdk+7Q6v0wfYJITU
9phFNKWNmYgd/Kxwq6KNak/9PcVSLugzm5k+HPLvrEtUQ/8gcLg=
=DzaJ
-----END PGP SIGNATURE-----

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    15 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close