|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
libplist: three vulnerabilities
Synthesis of the vulnerability
An attacker can use several vulnerabilities of libplist.
Impacted products: Debian, openSUSE Leap, Slackware.
Creation date: 21/02/2017.
Identifiers: CVE-2017-5834, CVE-2017-5835, CVE-2017-5836, DLA-840-1, openSUSE-SU-2017:0528-1, openSUSE-SU-2017:1426-1, SSA:2017-320-01, VIGILANCE-VUL-21912.
Description of the vulnerability
Several vulnerabilities were announced in libplist.
An attacker can generate a buffer overflow via parse_dict_node, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2017-5834]
An attacker can trigger a fatal error via Memory Allocation Error, in order to trigger a denial of service. [severity:1/4; CVE-2017-5835]
An attacker can generate a memory corruption via bplist.c, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2017-5836]
Complete Vigil@nce bulletin.... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides applications vulnerabilities announces. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.