Vulnerability Name: CVE-2017-5332 (CCN-125734) Assigned: 2017-01-08 Published: 2017-01-08 Updated: 2019-11-06 Summary: The extract_group_icon_cursor_resource in wrestool/extract.c in icoutils before 0.31.1 can access unallocated memory, which allows local users to cause a denial of service (process crash) and execute arbitrary code via a crafted executable. CVSS v3 Severity: 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H )6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): RequiredScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
2.8 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L )2.5 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): LowUser Interaction (UI): RequiredScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
2.8 Low (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L )2.5 Low (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): LowUser Interaction (UI): RequiredScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
1.7 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Type: CWE-119 CWE-190 CWE-125 CWE-125 Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2017-5332 Source: CCN Type: icoutils GIT Repositoryprevent access to unallocated memory in wrestool (BZ #1249276) Source: SUSE Type: Mailing List, Third Party AdvisoryopenSUSE-SU-2017:0166 Source: SUSE Type: Mailing List, Third Party AdvisoryopenSUSE-SU-2017:0167 Source: SUSE Type: Mailing List, Third Party AdvisoryopenSUSE-SU-2017:0168 Source: REDHAT Type: Third Party AdvisoryRHSA-2017:0837 Source: DEBIAN Type: Third Party AdvisoryDSA-3765 Source: CCN Type: IBM Security Bulletin T1025264 (PowerKVM)Vulnerabilities in icoutils affect PowerKVM Source: MLIST Type: Mailing List, Patch, Third Party Advisory[oss-security] 20170110 Re: CVE Request: icoutils: exploitable crash in wrestool programm Source: BID Type: Third Party Advisory, VDB Entry95380 Source: CCN Type: BID-95380icoutils CVE-2017-5332 Local Code Execution Vulnerability Source: UBUNTU Type: Third Party AdvisoryUSN-3178-1 Source: CCN Type: Red Hat Bugzilla Bug 1412263(CVE-2017-5332) CVE-2017-5332 icoutils: Access to unallocated memory possible in extract.c Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisoryhttps://bugzilla.redhat.com/show_bug.cgi?id=1412263 Source: XF Type: UNKNOWNicoutils-cve20175332-dos(125734) Source: CONFIRM Type: Patch, Third Party Advisoryhttps://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=1aa9f28f7bcbdfff6a84a15ac8d9a87559b1596a Source: CCN Type: icoutils Web siteicoutils Vulnerable Configuration: Configuration 1 :cpe:/a:icoutils_project:icoutils:*:*:*:*:*:*:*:* (Version < 0.31.1)Configuration 2 :cpe:/o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* Configuration 3 :cpe:/o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* Configuration 4 :cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:* Configuration 5 :cpe:/o:opensuse:leap:42.1:*:*:*:*:*:*:* OR cpe:/o:opensuse:leap:42.2:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:13.2:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:* Configuration CCN 1 :cpe:/a:icoutils_project:icoutils:0.31.1:*:*:*:*:*:*:* AND cpe:/a:ibm:powerkvm:2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:powerkvm:3.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop:7:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_hpc_node:7:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server:7:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_workstation:7:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
icoutils_project icoutils *
redhat enterprise linux 7.0
redhat enterprise linux desktop 7.0
redhat enterprise linux server aus 7.3
redhat enterprise linux server aus 7.4
redhat enterprise linux server aus 7.6
redhat enterprise linux server aus 7.7
redhat enterprise linux server eus 7.3
redhat enterprise linux server eus 7.4
redhat enterprise linux server eus 7.5
redhat enterprise linux server eus 7.6
redhat enterprise linux server eus 7.7
redhat enterprise linux server tus 7.3
redhat enterprise linux server tus 7.6
redhat enterprise linux server tus 7.7
redhat enterprise linux workstation 7.0
canonical ubuntu linux 12.04
debian debian linux 8.0
debian debian linux 9.0
debian debian linux 10.0
opensuse leap 42.1
opensuse leap 42.2
opensuse opensuse 13.2
icoutils_project icoutils 0.31.1
ibm powerkvm 2.1
ibm powerkvm 3.1
redhat enterprise linux desktop 7
redhat enterprise linux hpc node 7
redhat enterprise linux server 7
redhat enterprise linux workstation 7
redhat enterprise linux server tus 7.3