Bug 935939 (CVE-2015-2278) - VUL-0: CVE-2015-2278 CVE-2015-2282: clamsap: security fixes
Summary: VUL-0: CVE-2015-2278 CVE-2015-2282: clamsap: security fixes
Status: RESOLVED FIXED
Alias: CVE-2015-2278
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: CVSSv2:NVD:CVE-2015-2278:5.0:(AV:N/AC...
Keywords:
Depends on:
Blocks:
 
Reported: 2015-06-24 16:07 UTC by Marcus Meissner
Modified: 2016-04-27 19:41 UTC (History)
4 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2015-06-24 16:07:29 UTC
via clamsap update

- Security fix for compression, see CVE-2015-2282 and CVE-2015-2278

CVE-2015-2278 is:
The LZH decompression implementation (CsObjectInt::BuildHufTree function in vpa108csulzh.cpp) in SAP MaxDB 7.5 and 7.6, Netweaver Application Server ABAP, Netweaver Application Server Java, Netweaver RFC SDK, GUI, RFC SDK, SAPCAR archive tool, and other products allows context-dependent attackers to cause a denial of service (out-of-bounds read) via unspecified vectors, related to look-ups of non-simple codes, aka SAP Security Note 2124806, 2121661, 2127995, and 2125316. 

CVE-2015-2282 is:
Stack-based buffer overflow in the LZC decompression implementation (CsObjectInt::CsDecomprLZC function in vpa106cslzc.cpp) in SAP MaxDB 7.5 and 7.6, Netweaver Application Server ABAP, Netweaver Application Server Java, Netweaver RFC SDK, GUI, RFC SDK, SAPCAR archive tool, and other products allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, aka SAP Security Note 2124806, 2121661, 2127995, and 2125316.
Comment 1 Marcus Meissner 2015-06-24 16:12:48 UTC
(in OBS security/clamsap)
Comment 2 Swamp Workflow Management 2015-06-24 22:00:35 UTC
bugbot adjusting priority
Comment 3 Marcus Meissner 2015-09-15 13:13:15 UTC
FATE#319044: [ECO] Update clamsap

was approved. please submit fixed packages.
Comment 5 SMASH SMASH 2015-12-17 14:06:09 UTC
An update workflow for this issue was started.

This issue was rated as "moderate".
Please submit fixed packages until "Dec. 31, 2015".

When done, reassign the bug to "security-team@suse.de".
/update/121180/.
Comment 8 Marcus Meissner 2015-12-28 15:21:35 UTC
clamav.h needs openssl headers present, so add

BuildRequires: libopenssl-devel
Comment 9 Peter Varkoly 2015-12-28 15:49:55 UTC
(In reply to Marcus Meissner from comment #8)
> clamav.h needs openssl headers present, so add
> 
> BuildRequires: libopenssl-devel

Thanks:
created request id 86966, 86970
Comment 10 Alexander Bergmann 2016-02-17 14:29:13 UTC
Some details can be found here:

http://www.coresecurity.com/advisories/sap-lzc-lzh-compression-multiple-vulnerabilities

The following is a diff between the old version clamsap-0.9.8.0) and clamsap-0.98.9.

Inside src/csdecompr.c:

The "7.1. LZC decompression stack-based buffer overflow" CVE-2015-2282 is fixed here:

333 @@ -2984,6 +3034,10 @@ int CsDecomprLZC (CSC      * csc,
334      /* Generate output characters in reverse order ...................*/
335      while (code >= 256)
336      {
337 +      /* Check for end of stack */
338 +      if (stackp >= (DE_STACK + DE_STACK_OFFSET)){
339 +          return (CS_E_STACK_OVERFLOW);
340 +      }
341        *stackp++ = TAB_SUFFIXOF(code);
342        OVERFLOW_CHECK
343        code = TAB_PREFIXOF(code);


The "7.2. LZH decompression out-of-bounds read" issue CVE-2015-2278 is handled here:

321 @@ -1937,6 +1982,11 @@ int BuildHufTree (CSHU *cshu,
322        }
323        else
324        {
325 +        /* Added check for out-of-bounds read of e & d arrays */
326 +        if ((*p - s) >= (LENGTH_CODES + 2)){
327 +            return (CS_E_BAD_HUF_TREE);
328 +        }
329 +
330          r.e = (unsigned char) e[*p - s]; /*non-simple,look up in lists*/
331          r.v.n = (unsigned short) d[*p - s];
332          p++;
Comment 11 Marcus Meissner 2016-03-17 14:49:11 UTC
released
Comment 12 Marcus Meissner 2016-03-17 16:49:23 UTC
released
Comment 13 Swamp Workflow Management 2016-03-17 18:12:11 UTC
SUSE-SU-2016:0805-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 935939
CVE References: CVE-2015-2278,CVE-2015-2282
Sources used:
SUSE Linux Enterprise Server for SAP 12 (src):    clamsap-0.98.9-4.1
Comment 14 Swamp Workflow Management 2016-03-17 18:14:10 UTC
SUSE-SU-2016:0807-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 935939
CVE References: CVE-2015-2278,CVE-2015-2282
Sources used:
SUSE Linux Enterprise Server for SAP 11-SP4 (src):    clamsap-0.98.9-0.7.1