Bug 1479281 (CVE-2017-2885) - CVE-2017-2885 libsoup: Stack based buffer overflow with HTTP Chunked Encoding
Summary: CVE-2017-2885 libsoup: Stack based buffer overflow with HTTP Chunked Encoding
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2017-2885
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1479321 1479322 1480239 1480240 1480241
Blocks: 1479282
TreeView+ depends on / blocked
 
Reported: 2017-08-08 08:56 UTC by Andrej Nemec
Modified: 2021-02-17 01:45 UTC (History)
11 users (show)

Fixed In Version: libsoup 2.59.90.1, libsoup 2.58.2, libsoup 2.56.1
Doc Type: If docs needed, set a value
Doc Text:
A stack-based buffer overflow flaw was discovered within the HTTP processing of libsoup. A remote attacker could exploit this flaw to cause a crash or, potentially, execute arbitrary code by sending a specially crafted HTTP request to a server using the libsoup HTTP server functionality or by tricking a user into connecting to a malicious HTTP server with an application using the libsoup HTTP client functionality.
Clone Of:
Environment:
Last Closed: 2017-08-16 08:34:41 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
GNOME Bugzilla 785774 0 None None None 2017-08-08 13:39:35 UTC
Red Hat Product Errata RHSA-2017:2459 0 normal SHIPPED_LIVE Important: libsoup security update 2017-08-10 19:39:01 UTC

Description Andrej Nemec 2017-08-08 08:56:54 UTC
A stack based buffer overflow vulnerability has been reported in GNOME libsoup 2.58. The flaw is caused due to a boundary error within the "soup_filter_input_stream_read_until()" function when parsing chunk encoded HTTP traffic and affects both the server and client functionality of libsoup.

A remote attacker could exploit this flaw to cause a crash or, potentially, execute arbitrary code by sending a specially crafted HTTP request to a server using the libsoup HTTP server functionality or by tricking a user into connecting to a malicious HTTP server with an application using the libsoup HTTP client functionality.

Please note that the libsoup packages as shipped with Red Hat Enterprise Linux 7 contain a "stack smashing protection" mitigation for the relevant function, which makes exploitation significantly harder. Thus, in most cases an exploitation attempt should be mitigated to a mere crash. However, successful exploitation to execute arbitrary code can't be ruled out entirely.

Comment 1 Andrej Nemec 2017-08-08 08:56:58 UTC
Acknowledgments:

Name: Aleksandar Nikolic (Cisco Talos)

Comment 6 Stefan Cornelius 2017-08-10 13:02:57 UTC
Statement:

This issue affects the libsoup packages as shipped with Red Hat Enterprise Linux 7. However, these packages have been compiled with additional security mitigation techniques ("stack smashing protection"), which makes exploitation significantly harder. Thus, in most cases an exploitation attempt should be mitigated to a mere crash. However, successful exploitation to execute arbitrary code can't be ruled out entirely.

Comment 7 Stefan Cornelius 2017-08-10 13:12:33 UTC
Public via: https://bugzilla.gnome.org/show_bug.cgi?id=785774

Comment 8 Stefan Cornelius 2017-08-10 13:16:30 UTC
Created libsoup tracking bugs for this issue:

Affects: fedora-all [bug 1480241]


Created mingw-libsoup tracking bugs for this issue:

Affects: epel-7 [bug 1480239]
Affects: fedora-all [bug 1480240]

Comment 9 errata-xmlrpc 2017-08-10 15:40:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:2459 https://access.redhat.com/errata/RHSA-2017:2459

Comment 11 Adam Mariš 2017-08-11 14:28:59 UTC
External References:

https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392


Note You need to log in before you can comment on or make changes to this bug.