Bug 1666023 (CVE-2018-20721)

Summary: CVE-2018-20721 uriparser: Out-of-bounds read in uriParse*Ex*
Product: [Other] Security Response Reporter: Laura Pardo <lpardo>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: NEW --- QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: fdc, huzaifas, jkucera, manisandro, rakesh.pandit
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=low,public=20181208,reported=20190102,source=gentoo,cvss3=5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,cwe=CWE-125,fedora-all/uriparser=affected,rhel-7/uriparser=affected,fedora-all/mingw-uriparser=affected
Fixed In Version: uriparser 0.9.1 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
Bug Depends On: 1667917, 1666025, 1666026    
Bug Blocks: 1666027    

Description Laura Pardo 2019-01-14 16:58:11 UTC
A flaw was found in uriparser before version 0.9.1. An Out-of-bounds read in uriParse*Ex* for incomplete URIs with IPv6 addresses with embedded IPv4 address, e.g. "//[::44.1"; mitigated if passed parameter <afterLast> points to readable memory containing a '\0' byte.


References:
https://github.com/uriparser/uriparser/blob/uriparser-0.9.1/ChangeLog#L9

Upstream Patch:
https://github.com/uriparser/uriparser/commit/cef25028de5ff872c2e1f0a6c562eb3ea9ecbce4

Comment 1 Laura Pardo 2019-01-14 16:58:27 UTC
Created mingw-uriparser tracking bugs for this issue:

Affects: fedora-all [bug 1666026]


Created uriparser tracking bugs for this issue:

Affects: fedora-all [bug 1666025]

Comment 3 Stefan Cornelius 2019-01-21 12:33:43 UTC
Statement:

This issue affects the versions of uriparser as shipped with Red Hat Enterprise Linux 7.