Bugzilla – Bug 912214
VUL-0: CVE-2014-9556: libmspack: buffer overflow causing denial of service in qtmd_decompress()
Last modified: 2016-09-08 20:25:54 UTC
CVE-2014-9556 Jakub Wilk originally reported to the Debian BTS a problem with cabextract on a specially crafted cab file, causing cabextract to hang forever. The problem is actually in the embedded copy of libmspack, see [1]. Libmspack, a library to provide compression and decompression of some file formats used by Microsoft, is used in many project (or embedded there like also Clamav). This issue can cause a remotely exploitable denial-of-service condition due to clamav thread hanging forever while scanning the file. A patch is available at [2] for libmspack. References: [1] https://bugs.debian.org/773041 [2] http://anonscm.debian.org/cgit/collab-maint/libmspack.git/tree/debian/patches/qtmd-fix-frame_end-overflow.patch https://bugzilla.redhat.com/show_bug.cgi?id=1178867
bugbot adjusting priority
Package fixed using the last Debian / clamav patch. I sent a mail to the original upstream maintainer, as it seems to be active but not aware of this fix. openSUSE:Factory: Created OBS request id 282135. openSUSE:Maintenance (13.1, 13.2): Created OBS maintenance request id 282136 SUSE:Maintenance (SLE12): Created IBS maintenance request id 48764 SUSE:SLE-11:Update:Test: Created IBS request id 48766. Note: SLE10 seems to be affected as well. Please let me know if update is wanted there as well.
libmspack upstream used a different patch than clamav: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772891#33 This issue was fixed in revision 199: https://sourceforge.net/p/libmspack/code/199/
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2015-02-12. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/60449
openSUSE-SU-2015:0187-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 912214 CVE References: CVE-2014-9556 Sources used: openSUSE 13.2 (src): libmspack-0.4-5.4.1 openSUSE 13.1 (src): libmspack-0.4-2.4.1
SUSE-SU-2015:0366-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 912214 CVE References: CVE-2014-9556 Sources used: SUSE Linux Enterprise Software Development Kit 12 (src): libmspack-0.4-6.1 SUSE Linux Enterprise Server 12 (src): libmspack-0.4-6.1 SUSE Linux Enterprise Desktop 12 (src): libmspack-0.4-6.1
Replacing problematic patch from clamav upstream (which seems to cause hangs) by the patch from the mainline upstream.
Stanislav, your sr was declined from legal. Could you check and submit again please?
Looking at the later packages, I guess that I should change License to LGPL-2.1.
openSUSE-SU-2015:0449-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 912214 CVE References: CVE-2014-9556 Sources used: openSUSE 13.2 (src): libmspack-0.4-5.8.1 openSUSE 13.1 (src): libmspack-0.4-2.8.1
released
SUSE-SU-2015:0506-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 912214 CVE References: CVE-2014-9556 Sources used: SUSE Linux Enterprise Software Development Kit 12 (src): libmspack-0.4-10.1 SUSE Linux Enterprise Server 12 (src): libmspack-0.4-10.1 SUSE Linux Enterprise Desktop 12 (src): libmspack-0.4-10.1
SUSE-SU-2015:0508-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 912214 CVE References: CVE-2014-9556 Sources used: SUSE Linux Enterprise Software Development Kit 11 SP3 (src): libmspack-0.0.20060920alpha-74.5.1 SUSE Linux Enterprise Server 11 SP3 for VMware (src): libmspack-0.0.20060920alpha-74.5.1 SUSE Linux Enterprise Server 11 SP3 (src): libmspack-0.0.20060920alpha-74.5.1 SUSE Linux Enterprise Desktop 11 SP3 (src): libmspack-0.0.20060920alpha-74.5.1
An update workflow for this issue was started. This issue was rated as low. Please submit fixed packages until 2015-07-10. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/61986