Ubuntu 16.04 ESM / 18.04 ESM / 20.04 ESM : HDF5 vulnerabilities (USN-5272-1)

medium Nessus Plugin ID 183146

Synopsis

The remote Ubuntu host is missing one or more security updates.

Description

The remote Ubuntu 16.04 ESM / 18.04 ESM / 20.04 ESM host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-5272-1 advisory.

- A SIGFPE signal is raised in the function H5D__create_chunk_file_map_hyper() of H5Dchunk.c in the HDF HDF5 through 1.10.3 library during an attempted parse of a crafted HDF file, because of incorrect protection against division by zero. It could allow a remote denial of service attack. (CVE-2018-17233)

- Memory leak in the H5O__chunk_deserialize() function in H5Ocache.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service (memory consumption) via a crafted HDF5 file.
(CVE-2018-17234)

- A SIGFPE signal is raised in the function H5D__chunk_set_info_real() of H5Dchunk.c in the HDF HDF5 1.10.3 library during an attempted parse of a crafted HDF file, because of incorrect protection against division by zero. This issue is different from CVE-2018-11207. (CVE-2018-17237)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://ubuntu.com/security/notices/USN-5272-1

Plugin Details

Severity: Medium

ID: 183146

File Name: ubuntu_USN-5272-1.nasl

Version: 1.0

Type: local

Agent: unix

Published: 10/16/2023

Updated: 10/16/2023

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2018-17237

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:canonical:ubuntu_linux:16.04:-:esm, cpe:/o:canonical:ubuntu_linux:18.04:-:esm, cpe:/o:canonical:ubuntu_linux:20.04:-:esm, p-cpe:/a:canonical:ubuntu_linux:hdf5-helpers, p-cpe:/a:canonical:ubuntu_linux:hdf5-tools, p-cpe:/a:canonical:ubuntu_linux:libhdf5-10, p-cpe:/a:canonical:ubuntu_linux:libhdf5-100, p-cpe:/a:canonical:ubuntu_linux:libhdf5-103, p-cpe:/a:canonical:ubuntu_linux:libhdf5-7, p-cpe:/a:canonical:ubuntu_linux:libhdf5-cpp-100, p-cpe:/a:canonical:ubuntu_linux:libhdf5-cpp-103, p-cpe:/a:canonical:ubuntu_linux:libhdf5-cpp-11, p-cpe:/a:canonical:ubuntu_linux:libhdf5-dev, p-cpe:/a:canonical:ubuntu_linux:libhdf5-java, p-cpe:/a:canonical:ubuntu_linux:libhdf5-jni, p-cpe:/a:canonical:ubuntu_linux:libhdf5-mpi-dev, p-cpe:/a:canonical:ubuntu_linux:libhdf5-mpich-10, p-cpe:/a:canonical:ubuntu_linux:libhdf5-mpich-100, p-cpe:/a:canonical:ubuntu_linux:libhdf5-mpich-103, p-cpe:/a:canonical:ubuntu_linux:libhdf5-mpich-dev, p-cpe:/a:canonical:ubuntu_linux:libhdf5-mpich2-7, p-cpe:/a:canonical:ubuntu_linux:libhdf5-mpich2-dev, p-cpe:/a:canonical:ubuntu_linux:libhdf5-openmpi-10, p-cpe:/a:canonical:ubuntu_linux:libhdf5-openmpi-100, p-cpe:/a:canonical:ubuntu_linux:libhdf5-openmpi-103, p-cpe:/a:canonical:ubuntu_linux:libhdf5-openmpi-7, p-cpe:/a:canonical:ubuntu_linux:libhdf5-openmpi-dev, p-cpe:/a:canonical:ubuntu_linux:libhdf5-serial-dev

Required KB Items: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/20/2022

Vulnerability Publication Date: 9/20/2018

Reference Information

CVE: CVE-2018-17233, CVE-2018-17234, CVE-2018-17237

USN: 5272-1