Bug ID 1173589
Summary VUL-0: CVE-2018-3846: cfitsio: Unsafe use of sprintf() can allow a remote unauthenticated attacker to execute arbitrary code
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.1
Hardware Other
URL https://smash.suse.de/issue/204060/
OS Other
Status NEW
Severity Major
Priority P5 - None
Component Security
Assignee security-team@suse.de
Reporter atoptsoglou@suse.com
QA Contact security-team@suse.de
Found By Security Response Team
Blocker ---

CVE-2018-3846

NASA CFITSIO prior to 3.43 is affected by: Buffer Overflow. The impact is:
arbitrary code execution. The component is: over 40 source code files were
changed. The attack vector is: remote unauthenticated attacker. The fixed
version is: 3.43. NOTE: this CVE refers to the issues not covered by
CVE-2018-3846, CVE-2018-3847, CVE-2018-3848, and CVE-2018-3849. One example is
ftp_status in drvrnet.c mishandling a long string beginning with a '4'
character.

Upstream pull request:

https://github.com/astropy/astropy/pull/7274

References:

https://heasarc.gsfc.nasa.gov/FTP/software/fitsio/c/cfitsio3420.tar.gz
https://heasarc.gsfc.nasa.gov/FTP/software/fitsio/c/cfitsio3430.tar.gz
https://heasarc.gsfc.nasa.gov/FTP/software/fitsio/c/docs/changes2.txt
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892458

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1850866
https://bugzilla.redhat.com/show_bug.cgi?id=1563913
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-3846
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-3846.html
https://access.redhat.com/security/cve/CVE-2018-3846
http://www.cvedetails.com/cve/CVE-2018-3846/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3846
https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0529


You are receiving this mail because: