Arch Linux Security Advisory ASA-201712-3
========================================
Severity: Medium
Date    : 2017-12-02
CVE-ID  : CVE-2017-2816
Package : libofx
Type    : arbitrary code execution
Remote  : Yes
Link    : https://security.archlinux.org/AVG-534

Summary
======
The package libofx before version 0.9.12-1 is vulnerable to arbitrary
code execution.

Resolution
=========
Upgrade to 0.9.12-1.

# pacman -Syu "libofx>=0.9.12-1"

The problem has been fixed upstream in version 0.9.12.

Workaround
=========
None.

Description
==========
An exploitable buffer overflow vulnerability exists in the tag parsing
functionality of LibOFX 0.9.11. A specially crafted OFX file can cause
a write out of bounds resulting in a buffer overflow on the stack. An
attacker can construct a malicious OFX file to trigger this
vulnerability.

Impact
=====
A remote attacker is able to crash the application, or possibly execute
arbitrary code by providing a crafted file.

References
=========
https://bugs.archlinux.org/task/56539
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317
https://github.com/libofx/libofx/commit/a70934eea95c76a7737b83773bffe8738935082d
https://security.archlinux.org/CVE-2017-2816

ArchLinux: 201712-3: libofx: arbitrary code execution

December 3, 2017

Summary

An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability.

Resolution

Upgrade to 0.9.12-1. # pacman -Syu "libofx>=0.9.12-1"
The problem has been fixed upstream in version 0.9.12.

References

https://bugs.archlinux.org/task/56539 https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317 https://github.com/libofx/libofx/commit/a70934eea95c76a7737b83773bffe8738935082d https://security.archlinux.org/CVE-2017-2816

Severity
Package : libofx
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-534

Workaround

None.

Related News