openSUSE Security Update : libplist (openSUSE-2017-627)

Medium Nessus Plugin ID 100502


The remote openSUSE host is missing a security update.


This update for libplist fixes the following issues :

- CVE-2017-5209: The base64decode function in libplist allowed attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via split encoded Apple Property List data (bsc#1019531).

- CVE-2017-5545: The main function in plistutil.c in libimobiledevice libplist allowed attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short. (bsc#1021610).

- CVE-2017-5836: A type inconsistency in bplist.c was fixed. (bsc#1023807)

- CVE-2017-5835: A memory allocation error leading to DoS was fixed. (bsc#1023822)

- CVE-2017-5834: A heap-buffer overflow in parse_dict_node was fixed. (bsc#1023848)

- CVE-2017-6440: Ensure that sanity checks work on 32-bit platforms. (bsc#1029631)

- CVE-2017-7982: Add some safety checks, backported from upstream (bsc#1035312).

- CVE-2017-5836: A maliciously crafted file could cause the application to crash. (bsc#1023807).

- CVE-2017-5835: Malicious crafted file could cause libplist to allocate large amounts of memory and consume lots of CPU (bsc#1023822)

- CVE-2017-5834: Maliciou crafted file could cause a heap buffer overflow or segmentation fault (bsc#1023848) This update was imported from the SUSE:SLE-12-SP2:Update update project.


Update the affected libplist packages.

See Also

Plugin Details

Severity: Medium

ID: 100502

File Name: openSUSE-2017-627.nasl

Version: 3.2

Type: local

Agent: unix

Published: 2017/05/30

Updated: 2020/06/04

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P

CVSS v3.0

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libplist++-devel, p-cpe:/a:novell:opensuse:libplist++3, p-cpe:/a:novell:opensuse:libplist++3-32bit, p-cpe:/a:novell:opensuse:libplist++3-debuginfo, p-cpe:/a:novell:opensuse:libplist++3-debuginfo-32bit, p-cpe:/a:novell:opensuse:libplist-debugsource, p-cpe:/a:novell:opensuse:libplist-devel, p-cpe:/a:novell:opensuse:libplist3, p-cpe:/a:novell:opensuse:libplist3-32bit, p-cpe:/a:novell:opensuse:libplist3-debuginfo, p-cpe:/a:novell:opensuse:libplist3-debuginfo-32bit, p-cpe:/a:novell:opensuse:plistutil, p-cpe:/a:novell:opensuse:plistutil-debuginfo, p-cpe:/a:novell:opensuse:python-plist, p-cpe:/a:novell:opensuse:python-plist-debuginfo, cpe:/o:novell:opensuse:42.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2017/05/27

Reference Information

CVE: CVE-2017-5209, CVE-2017-5545, CVE-2017-5834, CVE-2017-5835, CVE-2017-5836, CVE-2017-6440, CVE-2017-7982