[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2017:1379-1 -- SLES libplist

ID: oval:org.secpod.oval:def:89044918Date: (C)2021-07-20   (M)2022-10-10
Class: PATCHFamily: unix




This update for libplist fixes the following issues: - CVE-2017-5209: The base64decode function in libplist allowed attackers to obtain sensitive information from process memory or cause a denial of service via split encoded Apple Property List data . - CVE-2017-5545: The main function in plistutil.c in libimobiledevice libplist allowed attackers to obtain sensitive information from process memory or cause a denial of service via Apple Property List data that is too short. - CVE-2017-5836: A type inconsistency in bplist.c was fixed. - CVE-2017-5835: A memory allocation error leading to DoS was fixed. - CVE-2017-5834: A heap-buffer overflow in parse_dict_node was fixed. - CVE-2017-6440: Ensure that sanity checks work on 32-bit platforms. - CVE-2017-7982: Add some safety checks, backported from upstream . - CVE-2017-5836: A maliciously crafted file could cause the application to crash. - CVE-2017-5835: Malicious crafted file could cause libplist to allocate large amounts of memory and consume lots of CPU - CVE-2017-5834: Maliciou crafted file could cause a heap buffer overflow or segmentation fault

Platform:
SUSE Linux Enterprise Server 12 SP2
Product:
libplist
Reference:
SUSE-SU-2017:1379-1
CVE-2017-5209
CVE-2017-5545
CVE-2017-5834
CVE-2017-5835
CVE-2017-5836
CVE-2017-6440
CVE-2017-7982
CVE    7
CVE-2017-6440
CVE-2017-5545
CVE-2017-5834
CVE-2017-5835
...
CPE    2
cpe:/a:libimobiledevice:libplist
cpe:/o:suse:suse_linux_enterprise_server:12:sp2

© SecPod Technologies