Arch Linux Security Advisory ASA-201701-13
=========================================
Severity: High
Date    : 2017-01-09
CVE-ID  : CVE-2017-5208
Package : icoutils
Type    : arbitrary code execution
Remote  : No
Link    : https://security.archlinux.org/AVG-129

Summary
======
The package icoutils before version 0.31.1-1 is vulnerable to arbitrary
code execution.

Resolution
=========
Upgrade to 0.31.1-1.

# pacman -Syu "icoutils>=0.31.1-1"

The problem has been fixed upstream in version 0.31.1.

Workaround
=========
None.

Description
==========
An integer overflow vulnerability was found in icoutils in the wrestool
program. A maliciously crafted file could make the application crash or
possibly lead to arbitrary code execution. This issue only affects
64-bit systems, as the result of subtracting two pointers exceeds the
size of int.

Impact
=====
An attacker is able to execute arbitrary code on a target machine by
tricking the user to open a specially crafted file.

References
=========
http://www.nongnu.org/icoutils/NEWS
https://seclists.org/oss-sec/2017/q1/38
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850017
https://salsa.debian.org/users/sign_in
https://security.archlinux.org/CVE-2017-5208

ArchLinux: 201701-13: icoutils: arbitrary code execution

January 9, 2017

Summary

An integer overflow vulnerability was found in icoutils in the wrestool program. A maliciously crafted file could make the application crash or possibly lead to arbitrary code execution. This issue only affects 64-bit systems, as the result of subtracting two pointers exceeds the size of int.

Resolution

Upgrade to 0.31.1-1. # pacman -Syu "icoutils>=0.31.1-1"
The problem has been fixed upstream in version 0.31.1.

References

http://www.nongnu.org/icoutils/NEWS https://seclists.org/oss-sec/2017/q1/38 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850017 https://salsa.debian.org/users/sign_in https://security.archlinux.org/CVE-2017-5208

Severity
Package : icoutils
Type : arbitrary code execution
Remote : No
Link : https://security.archlinux.org/AVG-129

Workaround

None.

Related News