EulerOS 2.0 SP3 : libplist (EulerOS-SA-2019-2613)
Medium Nessus Plugin ID 132148
SynopsisThe remote EulerOS host is missing multiple security updates.
DescriptionAccording to the versions of the libplist package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :
- libplist allows attackers to cause a denial of service (large memory allocation and crash) via vectors involving an offset size of zero.(CVE-2017-5835)
- The main function in plistutil.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short.(CVE-2017-5545)
- The parse_dict_node function in bplist.c in libplist allows attackers to cause a denial of service (out-of-bounds heap read and crash) via a crafted file.(CVE-2017-5834)
- The plist_free_data function in plist.c in libplist allows attackers to cause a denial of service (crash) via vectors involving an integer node that is treated as a PLIST_KEY and then triggers an invalid free.(CVE-2017-5836)
Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
SolutionUpdate the affected libplist packages.