Bug 1444097 (CVE-2017-7867) - CVE-2017-7867 icu: Heap-buffer overflow in utext_setNativeIndex function
Summary: CVE-2017-7867 icu: Heap-buffer overflow in utext_setNativeIndex function
Alias: CVE-2017-7867
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
: CVE-2017-7868 (view as bug list)
Depends On: 1444099 1444100 1444101
Blocks: Embargoed1444102
TreeView+ depends on / blocked
Reported: 2017-04-20 14:43 UTC by Andrej Nemec
Modified: 2021-02-17 02:14 UTC (History)
14 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in the International Components for Unicode (ICU). Specially crafted invalid utf-8 text, when parsed or manipulated using particular functions in libicu, could cause out-of-bounds heap reads and writes potentially leading to a crash, memory disclosure, or possibly code execution.
Clone Of:
Last Closed: 2017-09-21 10:55:39 UTC

Attachments (Terms of Use)

Description Andrej Nemec 2017-04-20 14:43:59 UTC
International Components for Unicode (ICU) for C/C++ has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function. 



Upstream patch:


Comment 1 Andrej Nemec 2017-04-20 14:46:13 UTC
Created icu tracking bugs for this issue:

Affects: fedora-all [bug 1444101]

Created mingw-icu tracking bugs for this issue:

Affects: epel-7 [bug 1444100]
Affects: fedora-all [bug 1444099]

Comment 3 Doran Moppert 2017-04-28 06:49:43 UTC
*** Bug 1444098 has been marked as a duplicate of this bug. ***

Comment 4 Doran Moppert 2017-05-31 05:41:14 UTC
The OOB writes demonstrated by the oss-fuzz crasher are small writes in a libicu internal structure, with very little control (size, location or content) accessible to the attacker.  The risk of ACE through this flaw is very small.

Comment 6 Doran Moppert 2017-05-31 05:49:56 UTC

Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Note You need to log in before you can comment on or make changes to this bug.