openSUSE Security Update : libical (openSUSE-2017-869)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for libical fixes the following issues :

Security issues fixed :

- CVE-2016-5824: libical 1.0 allows remote attackers to
cause a denial of service (use-after-free) via a crafted
ics file. (bsc#986639)

- CVE-2016-5827: The icaltime_from_string function in
libical 0.47 and 1.0 allows remote attackers to cause a
denial of service (out-of-bounds heap read) via a
crafted string to the icalparser_parse_string function.
(bsc#986631)

- CVE-2016-9584: libical allows remote attackers to cause
a denial of service (use-after-free) and possibly read
heap memory via a crafted ics file. (bsc#1015964)

Bug fixes :

- libical crashes while parsing timezones (bsc#1044995)

This update was imported from the SUSE:SLE-12-SP2:Update update
project.

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=1015964
https://bugzilla.opensuse.org/show_bug.cgi?id=1044995
https://bugzilla.opensuse.org/show_bug.cgi?id=986631
https://bugzilla.opensuse.org/show_bug.cgi?id=986639

Solution :

Update the affected libical packages.

Risk factor :

Medium / CVSS Base Score : 6.4
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P)

Family: SuSE Local Security Checks

Nessus Plugin ID: 102058 ()

Bugtraq ID:

CVE ID: CVE-2016-5824
CVE-2016-5827
CVE-2016-9584

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now