exploit the possibilities

Red Hat Security Advisory 2019-2048-01

Red Hat Security Advisory 2019-2048-01
Posted Aug 6, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-2048-01 - Exempi provides a library for easy parsing of XMP metadata. It is a port of Adobe XMP SDK to work on UNIX and to be build with GNU automake. It includes XMPCore and XMPFiles. Issues addressed include buffer overflow and denial of service vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability
systems | linux, redhat, unix
advisories | CVE-2017-18233, CVE-2017-18234, CVE-2017-18236, CVE-2017-18238, CVE-2018-7730
MD5 | 43dd8fb1ec49515837c898c069565392

Red Hat Security Advisory 2019-2048-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Low: exempi security update
Advisory ID: RHSA-2019:2048-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2019:2048
Issue date: 2019-08-06
CVE Names: CVE-2017-18233 CVE-2017-18234 CVE-2017-18236
CVE-2017-18238 CVE-2018-7730
====================================================================
1. Summary:

An update for exempi is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

3. Description:

Exempi provides a library for easy parsing of XMP metadata. It is a port of
Adobe XMP SDK to work on UNIX and to be build with GNU automake. It
includes XMPCore and XMPFiles.

Security Fix(es):

* exempi: Infinite Loop in Chunk class in
XMPFiles/source/FormatSupport/RIFF.cpp (CVE-2017-18233)

* exempi: Use after free via a PDF file containing JPEG data
(CVE-2017-18234)

* exempi: Infinite loop in ASF_Support::ReadHeaderObject function in
XMPFiles/source/FormatSupport/ASF_Support.cpp (CVE-2017-18236)

* exempi: Infinite loop in TradQT_Manager::ParseCachedBoxes function in
XMPFiles/source/FormatSupport/QuickTime_Support.cpp (CVE-2017-18238)

* exempi: Heap-based buffer overflow in PSD_MetaHandler::CacheFileData
function in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp allows for
denial of service via crafted XLS file (CVE-2018-7730)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.7 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1555163 - CVE-2018-7730 exempi: Heap-based buffer overflow in PSD_MetaHandler::CacheFileData function in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp allows for denial of service via crafted XLS file
1558715 - CVE-2017-18238 exempi: Infinite loop in TradQT_Manager::ParseCachedBoxes function in XMPFiles/source/FormatSupport/QuickTime_Support.cpp
1559575 - CVE-2017-18233 exempi: Infinite Loop in Chunk class in XMPFiles/source/FormatSupport/RIFF.cpp
1559590 - CVE-2017-18234 exempi: Use after free via a PDF file containing JPEG data
1559596 - CVE-2017-18236 exempi: Infinite loop in ASF_Support::ReadHeaderObject function in XMPFiles/source/FormatSupport/ASF_Support.cpp

6. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source:
exempi-2.2.0-9.el7.src.rpm

x86_64:
exempi-2.2.0-9.el7.i686.rpm
exempi-2.2.0-9.el7.x86_64.rpm
exempi-debuginfo-2.2.0-9.el7.i686.rpm
exempi-debuginfo-2.2.0-9.el7.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64:
exempi-debuginfo-2.2.0-9.el7.i686.rpm
exempi-debuginfo-2.2.0-9.el7.x86_64.rpm
exempi-devel-2.2.0-9.el7.i686.rpm
exempi-devel-2.2.0-9.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

Source:
exempi-2.2.0-9.el7.src.rpm

x86_64:
exempi-2.2.0-9.el7.i686.rpm
exempi-2.2.0-9.el7.x86_64.rpm
exempi-debuginfo-2.2.0-9.el7.i686.rpm
exempi-debuginfo-2.2.0-9.el7.x86_64.rpm
exempi-devel-2.2.0-9.el7.i686.rpm
exempi-devel-2.2.0-9.el7.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source:
exempi-2.2.0-9.el7.src.rpm

ppc64:
exempi-2.2.0-9.el7.ppc.rpm
exempi-2.2.0-9.el7.ppc64.rpm
exempi-debuginfo-2.2.0-9.el7.ppc.rpm
exempi-debuginfo-2.2.0-9.el7.ppc64.rpm

ppc64le:
exempi-2.2.0-9.el7.ppc64le.rpm
exempi-debuginfo-2.2.0-9.el7.ppc64le.rpm

s390x:
exempi-2.2.0-9.el7.s390.rpm
exempi-2.2.0-9.el7.s390x.rpm
exempi-debuginfo-2.2.0-9.el7.s390.rpm
exempi-debuginfo-2.2.0-9.el7.s390x.rpm

x86_64:
exempi-2.2.0-9.el7.i686.rpm
exempi-2.2.0-9.el7.x86_64.rpm
exempi-debuginfo-2.2.0-9.el7.i686.rpm
exempi-debuginfo-2.2.0-9.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64:
exempi-debuginfo-2.2.0-9.el7.ppc.rpm
exempi-debuginfo-2.2.0-9.el7.ppc64.rpm
exempi-devel-2.2.0-9.el7.ppc.rpm
exempi-devel-2.2.0-9.el7.ppc64.rpm

ppc64le:
exempi-debuginfo-2.2.0-9.el7.ppc64le.rpm
exempi-devel-2.2.0-9.el7.ppc64le.rpm

s390x:
exempi-debuginfo-2.2.0-9.el7.s390.rpm
exempi-debuginfo-2.2.0-9.el7.s390x.rpm
exempi-devel-2.2.0-9.el7.s390.rpm
exempi-devel-2.2.0-9.el7.s390x.rpm

x86_64:
exempi-debuginfo-2.2.0-9.el7.i686.rpm
exempi-debuginfo-2.2.0-9.el7.x86_64.rpm
exempi-devel-2.2.0-9.el7.i686.rpm
exempi-devel-2.2.0-9.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
exempi-2.2.0-9.el7.src.rpm

x86_64:
exempi-2.2.0-9.el7.i686.rpm
exempi-2.2.0-9.el7.x86_64.rpm
exempi-debuginfo-2.2.0-9.el7.i686.rpm
exempi-debuginfo-2.2.0-9.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64:
exempi-debuginfo-2.2.0-9.el7.i686.rpm
exempi-debuginfo-2.2.0-9.el7.x86_64.rpm
exempi-devel-2.2.0-9.el7.i686.rpm
exempi-devel-2.2.0-9.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2017-18233
https://access.redhat.com/security/cve/CVE-2017-18234
https://access.redhat.com/security/cve/CVE-2017-18236
https://access.redhat.com/security/cve/CVE-2017-18238
https://access.redhat.com/security/cve/CVE-2018-7730
https://access.redhat.com/security/updates/classification/#low
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html-single/7.7_release_notes/index

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBXUl23NzjgjWX9erEAQiUzg/+M5qP7gt/RebQ574U24ggpfjvlueeRvy2
VHJ6fkd4Ma7/zpxidOH2v++Pz4hzl9pjI7CKvgz9BFTzMEK0pMsmABLDYJf/q5La
8Ss3eE0yh6ZnbseRy5u8hZZNMMHHJzUCKRdnTKDLkjWfh1yvJe7LkppvKO3HH4c4
ckH9fiblSND4bsso/NLXKlR+NBmHyCJgpKlq9vfV16zxPyfn18VVxWzpzZPf++Pr
F9YEnRaDeQF/4rmSYFQca0kKuXFAEKeYkKcH+3bnxhBU5N8S1ZnpOO/s2/0qRNBr
N2wF+K6jxR9mRuZb2QirVbBcycgy4vOZzZ215OuW6KVqQHWBhzFEWYOgNigFshtw
VBn6gTSDq1En2S6kOCXmlpvYc7+6GZBjgBgIVgTu4MLA8vSn9LsX/Tbd89pGPzZb
Mwg4mqrguubY9skU/YAtEUQ/O52ImTXWPMOY68cJ3OQ6LBtb2Rou4ZEmK7kkNRwX
3cypFoBmqT5/hVIrZ/6LW7/j5f1ZLVnDkNy/PBcmFNXt7WQBwzVqPf0g8LC4mM9c
dC31FXOyUe3jPWkWge222kAXcUDHIBfDjpZ/7rJEkQI1JUdeA5RPmuAtivqs7K0y
KtYTIE8MHuHT/56ljaeYiMg7rWZMPxClLDU7QuqTAfhAl9hqVlLtliBTjjR6I5Tc
1Dg/r3zRhhA=YQ62
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

September 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    20 Files
  • 2
    Sep 2nd
    15 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    4 Files
  • 5
    Sep 5th
    1 Files
  • 6
    Sep 6th
    1 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    27 Files
  • 9
    Sep 9th
    7 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    9 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    25 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    15 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    12 Files
  • 19
    Sep 19th
    1 Files
  • 20
    Sep 20th
    1 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    21 Files
  • 23
    Sep 23rd
    8 Files
  • 24
    Sep 24th
    15 Files
  • 25
    Sep 25th
    4 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close