Bug 1411251 (CVE-2017-5208)

Summary: CVE-2017-5208 icoutils: Check_offset overflow on 64-bit systems
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: martin.gieseking, rjones
Target Milestone: ---Keywords: Reopened, Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: icoutils 0.31.1 Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in icoutils, in the wrestool program. An attacker could create a crafted executable that, when read by wrestool, could result in memory corruption leading to a crash or potential code execution.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 03:05:11 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1411252, 1411253, 1430610, 1430611    
Bug Blocks: 1411254    

Description Andrej Nemec 2017-01-09 09:16:59 UTC
An integer overflow vulnerability was found in icoutils in the wrestool program. A maliciously crafted file could make the application crash or possibly allow code execution.

References:

http://seclists.org/oss-sec/2017/q1/38
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850017

Upstream patches:

http://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=0d569f458f306b88f60156d60c9cf058125cf173
http://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=4fbe9222fd79ee31b7ec031b0be070a9a400d1d3

Comment 1 Andrej Nemec 2017-01-09 09:17:47 UTC
Created icoutils tracking bugs for this issue:

Affects: fedora-all [bug 1411252]
Affects: epel-6 [bug 1411253]

Comment 5 Doran Moppert 2017-03-10 01:50:31 UTC
As noted in comment 0, the patch for CVE-5208-5331 (bug 1412248) must be included to correctly address this vulnerability.

Comment 6 errata-xmlrpc 2017-03-23 01:14:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:0837 https://rhn.redhat.com/errata/RHSA-2017-0837.html