The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of usrsctp: out-of-bounds memory reading via sctp_load_addresses_from_init

Synthesis of the vulnerability 

An attacker can force a read at an invalid address via sctp_load_addresses_from_init() of usrsctp, in order to trigger a denial of service, or to obtain sensitive information.
Impacted software: iOS by Apple, iPhone, Debian, Fedora, Chrome, Edge Chromium, Firefox, Thunderbird, openSUSE Leap, Opera, Solaris, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity of this computer vulnerability: 2/4.
Creation date: 19/03/2020.
Références of this announce: ADV200002, bulletinapr2020, CVE-2019-20503, DLA-2140-1, DLA-2150-1, DSA-4639-1, DSA-4642-1, DSA-4645-1, FEDORA-2020-18f712ef2d, FEDORA-2020-39e0b8bd14, FEDORA-2020-b00f3fbb69, HT201222, HT211168, MFSA-2020-08, MFSA2020-08, MFSA-2020-09, MFSA2020-09, MFSA-2020-10, MFSA2020-10, openSUSE-SU-2020:0340-1, openSUSE-SU-2020:0365-1, openSUSE-SU-2020:0366-1, openSUSE-SU-2020:0389-1, RHSA-2020:0815-01, RHSA-2020:0816-01, RHSA-2020:0819-01, RHSA-2020:0820-01, RHSA-2020:0905-01, RHSA-2020:0914-01, RHSA-2020:0918-01, RHSA-2020:0919-01, RHSA-2020:1270-01, SSA:2020-070-01, SSA:2020-073-01, SUSE-SU-2020:0686-1, SUSE-SU-2020:0717-1, SUSE-SU-2020:0721-1, SUSE-SU-2020:14312-1, USN-4299-1, USN-4328-1, USN-4335-1, VIGILANCE-VUL-31834.

Description of the vulnerability 

An attacker can force a read at an invalid address via sctp_load_addresses_from_init() of usrsctp, in order to trigger a denial of service, or to obtain sensitive information.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity threat impacts software or systems such as iOS by Apple, iPhone, Debian, Fedora, Chrome, Edge Chromium, Firefox, Thunderbird, openSUSE Leap, Opera, Solaris, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.

Our Vigil@nce team determined that the severity of this computer threat note is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this security threat.

Solutions for this threat 

Apple iOS: version 13.5.
The version 13.5 is fixed:
  https://support.apple.com/

Chrome: version 80.0.3987.149.
The version 80.0.3987.149 is fixed:
  https://www.google.com/intl/fr_fr/chrome/

Debian 10: new chromium packages.
New packages are available:
  Debian 10: chromium 80.0.3987.149-1~deb10u1

Debian 8: new thunderbird packages.
New packages are available:
  Debian 8: thunderbird 1:68.6.0-1~deb8u1

Debian 9/10: new thunderbird packages.
New packages are available:
  Debian 9: thunderbird 1:68.6.0-1~deb9u1
  Debian 10: thunderbird 1:68.6.0-1~deb10u1

Debian: new firefox-esr packages.
New packages are available:
  Debian 8: firefox-esr 68.6.0esr-1~deb8u1
  Debian 9: firefox-esr 68.6.0esr-1~deb9u1
  Debian 10: firefox-esr 68.6.0esr-1~deb10u1

Fedora 30: new chromium packages.
New packages are available:
  Fedora 30: chromium 80.0.3987.149-1.fc30

Fedora 30: new seamonkey packages.
New packages are available:
  Fedora 30: seamonkey 2.53.1-2.fc30

Fedora 31: new firefox packages.
New packages are available:
  Fedora 31: firefox 74.0-3.fc31

Microsoft Edge Chromium: version 80.0.361.69.
The version 80.0.361.69 is fixed:
  https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV200002

Mozilla Firefox: version 74.
The version 74 is fixed:
  https://www.mozilla.org/en-US/firefox/new/

Mozilla Firefox: version ESR 68.6.
The version ESR 68.6 is fixed:
  https://www.mozilla.org/en-US/firefox/all/#product-desktop-esr

Mozilla Thunderbird: version 68.6.
The version 68.6 is fixed:
  https://www.thunderbird.net/en-US/thunderbird/all/#E

openSUSE Leap 15.1: new MozillaFirefox packages.
New packages are available:
  openSUSE Leap 15.1: MozillaFirefox 68.6.0-lp151.2.33.1

openSUSE Leap 15.1: new MozillaThunderbird packages.
New packages are available:
  openSUSE Leap 15.1: MozillaThunderbird 68.6.0-lp151.2.28.1

openSUSE Leap 15.1, SUSE LE 12: new chromium packages.
New packages are available:
  openSUSE Leap 15.1: chromium 80.0.3987.149-lp151.2.73.1
  SUSE LE 12 RTM-SP5: chromium 80.0.3987.149-41.1

Opera: version 67.0.3575.115.
The version 67.0.3575.115 is fixed:
  https://www.opera.com/fr/computer/thanks?ni=stable&os=windows

Oracle Solaris: patch for third party software of April 2020 v1.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

RHEL 6.10: new chromium-browser packages.
New packages are available:
  RHEL 6.10: chromium-browser 80.0.3987.149-1.el6_10

RHEL 6.10: new firefox packages.
New packages are available:
  RHEL 6.10: firefox 68.6.0-1.el6_10

RHEL 6.10: new thunderbird packages.
New packages are available:
  RHEL 6.10: thunderbird 68.6.0-1.el6_10

RHEL 7.7: new firefox packages.
New packages are available:
  RHEL 7.7: firefox 68.6.0-1.el7_7

RHEL 7.7: new thunderbird packages.
New packages are available:
  RHEL 7.7: thunderbird 68.6.0-1.el7_7

RHEL 8.0: new firefox packages.
New packages are available:
  RHEL 8.0: firefox 68.6.0-1.el8_0

RHEL 8.0: new thunderbird packages.
New packages are available:
  RHEL 8.0: thunderbird 68.6.0-1.el8_0

RHEL 8.1: new firefox packages.
New packages are available:
  RHEL 8.1: firefox 68.6.0-1.el8_1

RHEL 8.1: new thunderbird packages.
New packages are available:
  RHEL 8.1: thunderbird 68.6.0-1.el8_1

Slackware 14.2: new mozilla-firefox packages.
New packages are available:
  Slackware 14.2: mozilla-firefox 68.6.0esr-*-1_slack14.2

Slackware: new mozilla-thunderbird packages.
New packages are available:
  Slackware 14.2: mozilla-thunderbird 68.6.0-*-1_slack14.2

SUSE LE 11: new MozillaFirefox packages.
New packages are available:
  SUSE LE 11 SP4: MozillaFirefox 68.6.0-78.64.1

SUSE LE 12: new MozillaFirefox packages.
New packages are available:
  SUSE LE 12 SP1: MozillaFirefox 68.6.0-109.110.1
  SUSE LE 12 SP2: MozillaFirefox 68.6.0-109.110.1
  SUSE LE 12 SP3: MozillaFirefox 68.6.0-109.110.1
  SUSE LE 12 SP4: MozillaFirefox 68.6.0-109.110.1
  SUSE LE 12 SP5: MozillaFirefox 68.6.0-109.110.1

SUSE LE 15: new MozillaFirefox packages.
New packages are available:
  SUSE LE 15 SP1: MozillaFirefox 68.6.0-3.75.1
  SUSE LE 15 SP2: MozillaFirefox 68.6.0-3.75.1

SUSE LE 15 SP1: new chromium packages.
New packages are available:
  SUSE LE 15 SP1: chromium 80.0.3987.149-bp151.3.63.3

SUSE LE 15 SP1: new MozillaThunderbird packages.
New packages are available:
  SUSE LE 15 SP1: MozillaThunderbird 68.6.0-3.74.1

Ubuntu 16.04 LTS: new thunderbird packages.
New packages are available:
  Ubuntu 16.04 LTS: thunderbird 1:68.7.0+build1-0ubuntu0.16.04.2

Ubuntu: new firefox packages.
New packages are available:
  Ubuntu 19.10: firefox 74.0+build3-0ubuntu0.19.10.1
  Ubuntu 18.04 LTS: firefox 74.0+build3-0ubuntu0.18.04.1
  Ubuntu 16.04 LTS: firefox 74.0+build3-0ubuntu0.16.04.1

Ubuntu: new thunderbird packages.
New packages are available:
  Ubuntu 19.10: thunderbird 1:68.7.0+build1-0ubuntu0.19.10.1
  Ubuntu 18.04 LTS: thunderbird 1:68.7.0+build1-0ubuntu0.18.04.1
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a systems vulnerabilities bulletin. The technology watch team tracks security threats targeting the computer system.