Bug ID | 1173586 |
---|---|
Summary | VUL-0: CVE-2018-3849: cfitsio: Stack-based buffer overflow in ffghtb() allows for potential code execution |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 15.1 |
Hardware | Other |
URL | https://smash.suse.de/issue/204062/ |
OS | Other |
Status | NEW |
Severity | Major |
Priority | P5 - None |
Component | Security |
Assignee | security-team@suse.de |
Reporter | atoptsoglou@suse.com |
QA Contact | security-team@suse.de |
Found By | Security Response Team |
Blocker | --- |
CVE-2018-3849 NASA CFITSIO prior to 3.43 is affected by: Buffer Overflow. The impact is: arbitrary code execution. The component is: over 40 source code files were changed. The attack vector is: remote unauthenticated attacker. The fixed version is: 3.43. NOTE: this CVE refers to the issues not covered by CVE-2018-3846, CVE-2018-3847, CVE-2018-3848, and CVE-2018-3849. One example is ftp_status in drvrnet.c mishandling a long string beginning with a '4' character. Upstream pull request: https://github.com/astropy/astropy/pull/7274 References: https://heasarc.gsfc.nasa.gov/FTP/software/fitsio/c/cfitsio3420.tar.gz https://heasarc.gsfc.nasa.gov/FTP/software/fitsio/c/cfitsio3430.tar.gz https://heasarc.gsfc.nasa.gov/FTP/software/fitsio/c/docs/changes2.txt https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892458 References: https://bugzilla.redhat.com/show_bug.cgi?id=1850866 https://bugzilla.redhat.com/show_bug.cgi?id=1568185 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-3849 https://access.redhat.com/security/cve/CVE-2018-3849 http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-3849.html http://www.cvedetails.com/cve/CVE-2018-3849/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3849