Bug 732106 (CVE-2011-3170)

Summary: CVE-2011-3170 cups: gif_read_lzw() does not properly handle first code word in an LZW stream, which may lead to arbitrary code execution
Product: [Other] Security Response Reporter: Vincent Danen <vdanen>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: jpopelka, prc, twaugh
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-08-24 05:40:21 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 732107    
Bug Blocks: 732110    

Description Vincent Danen 2011-08-19 19:45:09 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2011-3170 to
the following vulnerability:

Name: CVE-2011-3170
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3170
Assigned: 20110819
Reference: http://cups.org/str.php?L3914
Reference: https://bugzilla.redhat.com/show_bug.cgi?id=727800

The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and
earlier does not properly handle the first code word in an LZW stream,
which allows remote attackers to trigger a heap-based buffer overflow,
and possibly execute arbitrary code, via a crafted stream, a different
vulnerability than CVE-2011-2896.

Comment 1 Vincent Danen 2011-08-19 19:47:27 UTC
Created cups tracking bugs for this issue

Affects: fedora-all [bug 732107]

Comment 2 Vincent Danen 2011-08-19 19:48:41 UTC
Fixed upstream in r9865.

Comment 3 Tomas Hoger 2011-08-19 20:18:51 UTC
This is what we have mentioned in bug #727800, comment #8.  Sounds like an incomplete CVE-2011-2896 fix id to me.

Comment 4 Vincent Danen 2011-08-19 20:24:52 UTC
Yes, I think you're right on that count.

Comment 5 Vincent Danen 2011-08-19 20:26:15 UTC
Statement:

Not affected.  This flaw was introduced in CUPS due to an incomplete fix for CVE-2011-2896, which was not applied to any CUPS packages in Red Hat Enterprise Linux.