Vulnerability Name: CVE-2017-5333 (CCN-125735) Assigned: 2017-01-08 Published: 2017-01-08 Updated: 2019-11-07 Summary: Integer overflow in the extract_group_icon_cursor_resource function in b/wrestool/extract.c in icoutils before 0.31.1 allows local users to cause a denial of service (process crash) or execute arbitrary code via a crafted executable file. CVSS v3 Severity: 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H )6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): RequiredScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
8.1 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L )7.1 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): LowUser Interaction (UI): RequiredScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): Low
8.1 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L )7.1 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): LowUser Interaction (UI): RequiredScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): Low
CVSS v2 Severity: 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
6.4 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:P )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Partial
Vulnerability Type: CWE-190 CWE-190 CWE-122 CWE-122 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2017-5333 Source: CCN Type: icoutils GIT Repositorywrestool: Fix an index, additional check Source: SUSE Type: Mailing List, Third Party AdvisoryopenSUSE-SU-2017:0166 Source: SUSE Type: Mailing List, Third Party AdvisoryopenSUSE-SU-2017:0167 Source: SUSE Type: Mailing List, Third Party AdvisoryopenSUSE-SU-2017:0168 Source: REDHAT Type: Third Party AdvisoryRHSA-2017:0837 Source: DEBIAN Type: Third Party AdvisoryDSA-3765 Source: CCN Type: IBM Security Bulletin T1025264 (PowerKVM)Vulnerabilities in icoutils affect PowerKVM Source: MLIST Type: Mailing List, Patch, Third Party Advisory[oss-security] 20170110 Re: CVE Request: icoutils: exploitable crash in wrestool programm Source: BID Type: Third Party Advisory, VDB Entry95678 Source: CCN Type: BID-95678icoutils CVE-2017-5333 Local Integer Overflow Vulnerability Source: UBUNTU Type: Third Party AdvisoryUSN-3178-1 Source: CCN Type: Red Hat Bugzilla Bug 1412259(CVE-2017-5333) CVE-2017-5333 icoutils: Integer overflow vulnerability in extract.c Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisoryhttps://bugzilla.redhat.com/show_bug.cgi?id=1412259 Source: XF Type: UNKNOWNicoutils-cve20175333-overflow(125735) Source: CONFIRM Type: Mailing List, Patch, Third Party Advisoryhttps://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=1a108713ac26215c7568353f6e02e727e6d4b24a Source: CCN Type: icoutils Web siteicoutils Vulnerable Configuration: Configuration 1 :cpe:/a:icoutils_project:icoutils:*:*:*:*:*:*:*:* (Version < 0.31.1)Configuration 2 :cpe:/o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* Configuration 3 :cpe:/o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* Configuration 4 :cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:* Configuration 5 :cpe:/o:opensuse:leap:42.1:*:*:*:*:*:*:* OR cpe:/o:opensuse:leap:42.2:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:13.2:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:* Configuration CCN 1 :cpe:/a:icoutils_project:icoutils:0.31.1:*:*:*:*:*:*:* AND cpe:/a:ibm:powerkvm:2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:powerkvm:3.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop:7:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_hpc_node:7:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server:7:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_workstation:7:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
icoutils_project icoutils *
redhat enterprise linux 7.0
redhat enterprise linux desktop 7.0
redhat enterprise linux server aus 7.3
redhat enterprise linux server aus 7.4
redhat enterprise linux server aus 7.6
redhat enterprise linux server aus 7.7
redhat enterprise linux server eus 7.3
redhat enterprise linux server eus 7.4
redhat enterprise linux server eus 7.5
redhat enterprise linux server eus 7.6
redhat enterprise linux server eus 7.7
redhat enterprise linux server tus 7.3
redhat enterprise linux server tus 7.6
redhat enterprise linux server tus 7.7
redhat enterprise linux workstation 7.0
canonical ubuntu linux 12.04
debian debian linux 8.0
debian debian linux 9.0
debian debian linux 10.0
opensuse leap 42.1
opensuse leap 42.2
opensuse opensuse 13.2
icoutils_project icoutils 0.31.1
ibm powerkvm 2.1
ibm powerkvm 3.1
redhat enterprise linux desktop 7
redhat enterprise linux hpc node 7
redhat enterprise linux server 7
redhat enterprise linux workstation 7
redhat enterprise linux server tus 7.3