Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2017-11423

Published: 18 July 2017

The cabd_read_string function in mspack/cabd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2 and other products, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted CAB file.

Notes

AuthorNote
mdeslaur
clamav in xenial+ uses the system libmspack, trusty uses
the embedded one.

code in trusty clamav is different, doesn't appear vulnerable

Priority

Medium

Cvss 3 Severity Score

5.5

Score breakdown

Status

Package Release Status
clamav
Launchpad, Ubuntu, Debian
artful Not vulnerable
(uses system libmspack)
bionic Not vulnerable
(uses system libmspack)
cosmic Not vulnerable
(uses system libmspack)
disco Not vulnerable
(uses system libmspack)
focal Not vulnerable
(uses system libmspack)
jammy Not vulnerable
(uses system libmspack)
kinetic Not vulnerable
(uses system libmspack)
lunar Not vulnerable
(uses system libmspack)
trusty Not vulnerable
(code not present)
upstream Needs triage

xenial Not vulnerable
(uses system libmspack)
zesty Not vulnerable
(uses system libmspack)
Patches:
upstream: https://github.com/vrtadmin/clamav-devel/commit/ffa31264a657618a0e40c51c01e4bfc32e244d13
upstream: https://github.com/vrtadmin/clamav-devel/commit/ada5f94e5cfb04e1ac2a6f383f2184753f475b96

libmspack
Launchpad, Ubuntu, Debian
artful Not vulnerable
(0.6-3)
bionic Not vulnerable
(0.6-3)
cosmic Not vulnerable
(0.6-3)
disco Not vulnerable
(0.6-3)
focal Not vulnerable
(0.6-3)
jammy Not vulnerable
(0.6-3)
kinetic Not vulnerable
(0.6-3)
lunar Not vulnerable
(0.6-3)
trusty Needed

upstream
Released (0.6-1)
xenial
Released (0.5-1ubuntu0.16.04.1)
yakkety Ignored
(reached end-of-life)
zesty
Released (0.5-1ubuntu0.17.04.1)
Patches:


upstream: https://github.com/kyz/libmspack/commit/17038206fcc384dcee6dd9e3a75f08fd3ddc6a38

Severity score breakdown

Parameter Value
Base score 5.5
Attack vector Local
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H