CVE-2018-8754
CVSS2.1
发布时间 :2018-03-17 23:29:00
修订时间 :2018-07-11 08:04:36
NMP    

[原文]The libevt_record_values_read_event() function in libevt_record_values.c in libevt before 2018-03-17 does not properly check for out-of-bounds values of user SID data size, strings size, or data size.


[CNNVD]CNNVD数据暂缺。


[机译]译文暂缺.

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-125 [跨界内存读]

- CPE (受影响的平台与产品)

cpe:/a:libevt_project:libevt:2017-01-20:alpha
cpe:/o:debian:debian_linux:9.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8754
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-8754
(官方数据源) NVD

- 其它链接及资源

https://github.com/libyal/libevt/commit/444ca3ce7853538c577e0ec3f6146d2d65780734
(VENDOR_ADVISORY)  MISC  https://github.com/libyal/libevt/commit/444ca3ce7853538c577e0ec3f6146d2d65780734
https://www.debian.org/security/2018/dsa-4160
(VENDOR_ADVISORY)  DEBIAN  DSA-4160

- 漏洞信息 (F147004)

Debian Security Advisory 4160-1 (PacketStormID:F147004)
2018-04-02 00:00:00
Debian  debian.org
advisory,denial of service,arbitrary
linux,windows,debian
CVE-2018-8754
[点击下载]

Debian Linux Security Advisory 4160-1 - It was discovered that insufficient input sanitising in libevt, a library to access the Windows Event Log (EVT) format, could result in denial of service or the execution of arbitrary code if a malformed EVT file is processed.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4160-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
April 01, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libevt
CVE ID         : CVE-2018-8754

It was discovered that insufficient input sanitising in libevt, a library
to access the Windows Event Log (EVT) format, could result in denial of
service or the execution of arbitrary code if a malformed EVT file is
processed.

For the stable distribution (stretch), this problem has been fixed in
version 20170120-1+deb9u1.

We recommend that you upgrade your libevt packages.

For the detailed security status of libevt please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libevt

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=ZoaG
-----END PGP SIGNATURE-----
    
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站