Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-12825

Опубликовано: 12 мая 2020
Источник: redhat
CVSS3: 7.1
EPSS Низкий

Описание

libcroco through 0.6.13 has excessive recursion in cr_parser_parse_any_core in cr-parser.c, leading to stack consumption.

A stack overflow flaw was found in libcroco. A service using libcroco's CSS parser could be crashed by a local, authenticated attacker, or an attacker utilizing social engineering, using a crafted input. The highest threat from this vulnerability is to system availability.

Отчет

While Red Hat Enterprise Linux 6, 7 and 8 ship versions of libcroco that are vulnerable to this flaw, the packages which use this library as a dependency would require a user to open a malicious file locally for exploitation. Opening such a file may result in a temporary crash of the application. See below for more detailed information:

  • Red Hat Enterprise Linux 8 - libcroco is a runtime dependency of gnome-shell, gettext and inkscape.
  • Red Hat Enterprise Linux 7 - libcroco is a runtime dependency of gnome-shell, gettext, librsvg2 and inkscape.
  • Red Hat Enterprise Linux 6 - libcroco is required by firefox to bundle gtk3 but firefox does not use libcroco as its CSS parsing engine or provide gtk3 to other packages, and thus not affected. libcroco is a runtime dependency of inkscape, librsvg2 and gettext. This flaw has only been demonstrated to cause a crash, but if there is any concern of further exploitation beyond that, Red Hat Enterprise Linux 6, 7, and 8 packages are built with a stack protector and stack ASLR which would significantly reduce the likelihood of further exploitation.

Меры по смягчению последствий

To mitigate this flaw as it applies to gnome-shell, do not install untrusted gnome-shell extensions or themes. Red Hat Enterprise Linux does not ship with gnome-shell themes that will trigger this vulnerability. To mitigate this flaw as it applies to inkscape, do not open untrusted CSS in inkscape.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5libcrocoOut of support scope
Red Hat Enterprise Linux 6gettextOut of support scope
Red Hat Enterprise Linux 6inkscapeOut of support scope
Red Hat Enterprise Linux 6libcrocoOut of support scope
Red Hat Enterprise Linux 7gettextNot affected
Red Hat Enterprise Linux 7inkscapeFix deferred
Red Hat Enterprise Linux 8gettextNot affected
Red Hat Enterprise Linux 8inkscapeFix deferred
Red Hat Enterprise Linux 9libcrocoAffected
Red Hat Enterprise Linux 7libcrocoFixedRHSA-2020:407229.09.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-674->CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1835377libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c

EPSS

Процентиль: 83%
0.02098
Низкий

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.1
ubuntu
около 5 лет назад

libcroco through 0.6.13 has excessive recursion in cr_parser_parse_any_core in cr-parser.c, leading to stack consumption.

CVSS3: 7.1
nvd
около 5 лет назад

libcroco through 0.6.13 has excessive recursion in cr_parser_parse_any_core in cr-parser.c, leading to stack consumption.

CVSS3: 7.1
debian
около 5 лет назад

libcroco through 0.6.13 has excessive recursion in cr_parser_parse_any ...

suse-cvrf
почти 4 года назад

Security update for libcroco

suse-cvrf
больше 3 лет назад

Security update for libcroco

EPSS

Процентиль: 83%
0.02098
Низкий

7.1 High

CVSS3