Debian DSA-3166-1 : e2fsprogs - security update

Medium Nessus Plugin ID 81446

Synopsis

The remote Debian host is missing a security-related update.

Description

Jose Duart of the Google Security Team discovered a buffer overflow in e2fsprogs, a set of utilities for the ext2, ext3, and ext4 file systems. This issue can possibly lead to arbitrary code execution if a malicious device is plugged in, the system is configured to automatically mount it, and the mounting process chooses to run fsck on the device's malicious filesystem.

- CVE-2015-0247 Buffer overflow in the ext2/ext3/ext4 file system open/close routines.

- CVE-2015-1572 Incomplete fix for CVE-2015-0247.

Solution

Upgrade the e2fsprogs packages.

For the stable distribution (wheezy), these problems have been fixed in version 1.42.5-1.1+deb7u1.

For the upcoming stable (jessie) and unstable (sid) distributions, these problems will be fixed soon.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778948

https://security-tracker.debian.org/tracker/CVE-2015-0247

https://security-tracker.debian.org/tracker/CVE-2015-1572

https://security-tracker.debian.org/tracker/CVE-2015-0247

https://packages.debian.org/source/wheezy/e2fsprogs

https://www.debian.org/security/2015/dsa-3166

Plugin Details

Severity: Medium

ID: 81446

File Name: debian_DSA-3166.nasl

Version: 1.3

Type: local

Agent: unix

Published: 2015/02/24

Updated: 2020/03/12

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.6

Temporal Score: 4

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:e2fsprogs, cpe:/o:debian:debian_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/02/22

Reference Information

CVE: CVE-2015-0247, CVE-2015-1572

BID: 72520

DSA: 3166