Bug 1850866 (CVE-2019-1010060)

Summary: CVE-2019-1010060 cfitsio: buffer overflow leads to arbitrary code execution
Product: [Other] Security Response Reporter: msiddiqu
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: unspecifiedCC: manisandro, mmahut, orion, sergio.pasra
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: cfitsio 3.43 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-06-25 05:20:25 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1850868, 1850867, 1850869    
Bug Blocks:    

Description msiddiqu 2020-06-25 05:03:02 UTC
NASA CFITSIO prior to 3.43 is affected by: Buffer Overflow. The impact is: arbitrary code execution. The component is: over 40 source code files were changed. The attack vector is: remote unauthenticated attacker. The fixed version is: 3.43. NOTE: this CVE refers to the issues not covered by CVE-2018-3846, CVE-2018-3847, CVE-2018-3848, and CVE-2018-3849. One example is ftp_status in drvrnet.c mishandling a long string beginning with a '4' character.

Upstream pull request:

https://github.com/astropy/astropy/pull/7274

References:

https://heasarc.gsfc.nasa.gov/FTP/software/fitsio/c/cfitsio3420.tar.gz
https://heasarc.gsfc.nasa.gov/FTP/software/fitsio/c/cfitsio3430.tar.gz
https://heasarc.gsfc.nasa.gov/FTP/software/fitsio/c/docs/changes2.txt
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892458

Comment 1 msiddiqu 2020-06-25 05:03:34 UTC
Created cfitsio tracking bugs for this issue:

Affects: epel-all [bug 1850868]
Affects: fedora-all [bug 1850867]


Created mingw-cfitsio tracking bugs for this issue:

Affects: fedora-all [bug 1850869]

Comment 2 Product Security DevOps Team 2020-06-25 05:20:25 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.