Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2015-03027

Опубликовано: 01 янв. 2015
Источник: fstec
CVSS2: 9.3
EPSS Низкий

Описание

Множественные уязвимости пакета liblcms-utils операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению конфиденциальности, целостности и доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно

Вендор

Сообщество свободного программного обеспечения

Наименование ПО

Debian GNU/Linux

Версия ПО

до 4 (Debian GNU/Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 9,3)

Возможные меры по устранению уязвимости

Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 4:
ppc:
liblcms1 - 1.15-1.1+etch2
liblcms-utils - 1.15-1.1+etch2
liblcms1-dev - 1.15-1.1+etch2
s390x:
liblcms1-dev - 1.15-1.1+etch2
liblcms-utils - 1.15-1.1+etch2
liblcms1 - 1.15-1.1+etch2
i686:
liblcms-utils - 1.15-1.1+etch2
liblcms1-dev - 1.15-1.1+etch2
liblcms1 - 1.15-1.1+etch2
arm:
liblcms1-dev - 1.15-1.1+etch2
liblcms-utils - 1.15-1.1+etch2
liblcms1 - 1.15-1.1+etch2
sparc:
liblcms1 - 1.15-1.1+etch2
liblcms-utils - 1.15-1.1+etch2
liblcms1-dev - 1.15-1.1+etch2
x86-64:
liblcms1-dev - 1.15-1.1+etch2
liblcms1 - 1.15-1.1+etch2
liblcms-utils - 1.15-1.1+etch2
alpha:
liblcms1-dev - 1.15-1.1+etch2
liblcms-utils - 1.15-1.1+etch2
liblcms1 - 1.15-1.1+etch2
ia64:
liblcms1-dev - 1.15-1.1+etch2
liblcms-utils - 1.15-1.1+etch2
liblcms1 - 1.15-1.1+etch2
mips:
liblcms1-dev - 1.15-1.1+etch2
liblcms-utils - 1.15-1.1+etch2
liblcms1 - 1.15-1.1+etch2
mipsel:
liblcms-utils - 1.15-1.1+etch2
liblcms1-dev - 1.15-1.1+etch2
liblcms1 - 1.15-1.1+etch2
hppa:
liblcms1-dev - 1.15-1.1+etch2
liblcms1 - 1.15-1.1+etch2
liblcms-utils - 1.15-1.1+etch2
Debian GNU/Linux 5:
ppc:
liblcms1-dev - 1.17.dfsg-1+lenny1
python-liblcms - 1.17.dfsg-1+lenny1
liblcms1 - 1.17.dfsg-1+lenny1
liblcms-utils - 1.17.dfsg-1+lenny1
s390x:
liblcms1 - 1.17.dfsg-1+lenny1
liblcms-utils - 1.17.dfsg-1+lenny1
python-liblcms - 1.17.dfsg-1+lenny1
liblcms1-dev - 1.17.dfsg-1+lenny1
i686:
liblcms1-dev - 1.17.dfsg-1+lenny1
liblcms1 - 1.17.dfsg-1+lenny1
python-liblcms - 1.17.dfsg-1+lenny1
liblcms-utils - 1.17.dfsg-1+lenny1
arm:
liblcms-utils - 1.17.dfsg-1+lenny1
liblcms1 - 1.17.dfsg-1+lenny1
python-liblcms - 1.17.dfsg-1+lenny1
liblcms1-dev - 1.17.dfsg-1+lenny1
sparc:
liblcms1-dev - 1.17.dfsg-1+lenny1
liblcms1 - 1.17.dfsg-1+lenny1
python-liblcms - 1.17.dfsg-1+lenny1
liblcms-utils - 1.17.dfsg-1+lenny1
x86-64:
liblcms-utils - 1.17.dfsg-1+lenny1
liblcms1-dev - 1.17.dfsg-1+lenny1
liblcms1 - 1.17.dfsg-1+lenny1
python-liblcms - 1.17.dfsg-1+lenny1
armel:
liblcms-utils - 1.17.dfsg-1+lenny1
liblcms1-dev - 1.17.dfsg-1+lenny1
python-liblcms - 1.17.dfsg-1+lenny1
liblcms1 - 1.17.dfsg-1+lenny1
alpha:
liblcms-utils - 1.17.dfsg-1+lenny1
python-liblcms - 1.17.dfsg-1+lenny1
liblcms1 - 1.17.dfsg-1+lenny1
liblcms1-dev - 1.17.dfsg-1+lenny1
ia64:
liblcms1-dev - 1.17.dfsg-1+lenny1
python-liblcms - 1.17.dfsg-1+lenny1
liblcms1 - 1.17.dfsg-1+lenny1
liblcms-utils - 1.17.dfsg-1+lenny1
mips:
liblcms-utils - 1.17.dfsg-1+lenny1
python-liblcms - 1.17.dfsg-1+lenny1
liblcms1 - 1.17.dfsg-1+lenny1
liblcms1-dev - 1.17.dfsg-1+lenny1
mipsel:
liblcms1-dev - 1.17.dfsg-1+lenny1
liblcms1 - 1.17.dfsg-1+lenny1
python-liblcms - 1.17.dfsg-1+lenny1
liblcms-utils - 1.17.dfsg-1+lenny1
hppa:
liblcms-utils - 1.17.dfsg-1+lenny1
liblcms1-dev - 1.17.dfsg-1+lenny1
liblcms1 - 1.17.dfsg-1+lenny1
python-liblcms - 1.17.dfsg-1+lenny1

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

EPSS

Процентиль: 83%
0.0212
Низкий

9.3 Critical

CVSS2

Связанные уязвимости

ubuntu
около 16 лет назад

Memory leak in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted image file.

redhat
больше 16 лет назад

Memory leak in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted image file.

nvd
около 16 лет назад

Memory leak in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted image file.

debian
около 16 лет назад

Memory leak in LittleCMS (aka lcms or liblcms) before 1.18beta2, as us ...

github
около 3 лет назад

Memory leak in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted image file.

EPSS

Процентиль: 83%
0.0212
Низкий

9.3 Critical

CVSS2