Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-2816 (GCVE-0-2017-2816)
Vulnerability from cvelistv5 – Published: 2017-09-13 18:00 – Updated: 2024-09-17 00:11
VLAI?
EPSS
Summary
An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability.
Severity ?
8.8 (High)
CWE
- buffer overflow
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Date Public ?
2017-09-13 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T14:02:07.753Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[debian-lts-announce] 20171126 [SECURITY] [DLA 1192-1] libofx security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00038.html"
},
{
"name": "100828",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/100828"
},
{
"name": "GLSA-201908-26",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201908-26"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "LibOfx",
"vendor": "LibOFX",
"versions": [
{
"status": "affected",
"version": "0.9.11"
}
]
}
],
"datePublic": "2017-09-13T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "buffer overflow",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-04-19T18:22:45.000Z",
"orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
"shortName": "talos"
},
"references": [
{
"name": "[debian-lts-announce] 20171126 [SECURITY] [DLA 1192-1] libofx security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00038.html"
},
{
"name": "100828",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/100828"
},
{
"name": "GLSA-201908-26",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201908-26"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "talos-cna@cisco.com",
"DATE_PUBLIC": "2017-09-13T00:00:00",
"ID": "CVE-2017-2816",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "LibOfx",
"version": {
"version_data": [
{
"version_value": "0.9.11"
}
]
}
}
]
},
"vendor_name": "LibOFX"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability."
}
]
},
"impact": {
"cvss": {
"baseScore": 8.8,
"baseSeverity": "High",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "buffer overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[debian-lts-announce] 20171126 [SECURITY] [DLA 1192-1] libofx security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00038.html"
},
{
"name": "100828",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100828"
},
{
"name": "GLSA-201908-26",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201908-26"
},
{
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317",
"refsource": "MISC",
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
"assignerShortName": "talos",
"cveId": "CVE-2017-2816",
"datePublished": "2017-09-13T18:00:00.000Z",
"dateReserved": "2016-12-01T00:00:00.000Z",
"dateUpdated": "2024-09-17T00:11:42.495Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2017-2816",
"date": "2026-05-01",
"epss": "0.00747",
"percentile": "0.73175"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-2816\",\"sourceIdentifier\":\"talos-cna@cisco.com\",\"published\":\"2017-09-13T18:29:00.243\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad explotable de desbordamiento de b\u00fafer en la funcionalidad de an\u00e1lisis sint\u00e1ctico de etiquetas de LibOFX 0.9.11. Un archivo OFX especialmente manipulado podr\u00eda provocar una escritura fuera de l\u00edmites, lo que resultar\u00eda en un desbordamiento de b\u00fafer en la pila. Un atacante puede crear un archivo OFX malicioso para provocar esta vulnerabilidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"talos-cna@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libofx_project:libofx:0.9.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84C3B3C1-4AE2-4755-A64F-438DE0BAE785\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/100828\",\"source\":\"talos-cna@cisco.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2017/11/msg00038.html\",\"source\":\"talos-cna@cisco.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201908-26\",\"source\":\"talos-cna@cisco.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317\",\"source\":\"talos-cna@cisco.com\",\"tags\":[\"Exploit\",\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/100828\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2017/11/msg00038.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201908-26\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Technical Description\",\"Third Party Advisory\"]}]}}"
}
}
FKIE_CVE-2017-2816
Vulnerability from fkie_nvd - Published: 2017-09-13 18:29 - Updated: 2025-04-20 01:37
Severity ?
Summary
An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability.
References
| URL | Tags | ||
|---|---|---|---|
| talos-cna@cisco.com | http://www.securityfocus.com/bid/100828 | Broken Link, Third Party Advisory, VDB Entry | |
| talos-cna@cisco.com | https://lists.debian.org/debian-lts-announce/2017/11/msg00038.html | Mailing List, Third Party Advisory | |
| talos-cna@cisco.com | https://security.gentoo.org/glsa/201908-26 | Third Party Advisory | |
| talos-cna@cisco.com | https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317 | Exploit, Technical Description, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100828 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2017/11/msg00038.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201908-26 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317 | Exploit, Technical Description, Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| libofx_project | libofx | 0.9.11 | |
| debian | debian_linux | 7.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libofx_project:libofx:0.9.11:*:*:*:*:*:*:*",
"matchCriteriaId": "84C3B3C1-4AE2-4755-A64F-438DE0BAE785",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad explotable de desbordamiento de b\u00fafer en la funcionalidad de an\u00e1lisis sint\u00e1ctico de etiquetas de LibOFX 0.9.11. Un archivo OFX especialmente manipulado podr\u00eda provocar una escritura fuera de l\u00edmites, lo que resultar\u00eda en un desbordamiento de b\u00fafer en la pila. Un atacante puede crear un archivo OFX malicioso para provocar esta vulnerabilidad."
}
],
"id": "CVE-2017-2816",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "talos-cna@cisco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-09-13T18:29:00.243",
"references": [
{
"source": "talos-cna@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/100828"
},
{
"source": "talos-cna@cisco.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00038.html"
},
{
"source": "talos-cna@cisco.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201908-26"
},
{
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/100828"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00038.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201908-26"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317"
}
],
"sourceIdentifier": "talos-cna@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2017-2816
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2017-2816",
"description": "An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability.",
"id": "GSD-2017-2816",
"references": [
"https://www.suse.com/security/cve/CVE-2017-2816.html",
"https://advisories.mageia.org/CVE-2017-2816.html",
"https://security.archlinux.org/CVE-2017-2816"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-2816"
],
"details": "An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability.",
"id": "GSD-2017-2816",
"modified": "2023-12-13T01:21:05.854313Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "talos-cna@cisco.com",
"DATE_PUBLIC": "2017-09-13T00:00:00",
"ID": "CVE-2017-2816",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "LibOfx",
"version": {
"version_data": [
{
"version_value": "0.9.11"
}
]
}
}
]
},
"vendor_name": "LibOFX"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability."
}
]
},
"impact": {
"cvss": {
"baseScore": 8.8,
"baseSeverity": "High",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "buffer overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[debian-lts-announce] 20171126 [SECURITY] [DLA 1192-1] libofx security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00038.html"
},
{
"name": "100828",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100828"
},
{
"name": "GLSA-201908-26",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201908-26"
},
{
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317",
"refsource": "MISC",
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:libofx_project:libofx:0.9.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "talos-cna@cisco.com",
"ID": "CVE-2017-2816"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317",
"refsource": "MISC",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317"
},
{
"name": "100828",
"refsource": "BID",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/100828"
},
{
"name": "[debian-lts-announce] 20171126 [SECURITY] [DLA 1192-1] libofx security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00038.html"
},
{
"name": "GLSA-201908-26",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201908-26"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-01-28T02:00Z",
"publishedDate": "2017-09-13T18:29Z"
}
}
}
GHSA-3W43-MHJ6-R4FJ
Vulnerability from github – Published: 2022-05-13 01:01 – Updated: 2022-05-13 01:01
VLAI?
Details
An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability.
Severity ?
8.8 (High)
{
"affected": [],
"aliases": [
"CVE-2017-2816"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-09-13T18:29:00Z",
"severity": "HIGH"
},
"details": "An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability.",
"id": "GHSA-3w43-mhj6-r4fj",
"modified": "2022-05-13T01:01:24Z",
"published": "2022-05-13T01:01:24Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2816"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00038.html"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201908-26"
},
{
"type": "WEB",
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/100828"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CNVD-2017-33828
Vulnerability from cnvd - Published: 2017-11-14
VLAI Severity ?
Title
LibOFX缓冲区溢出漏洞
Description
LibOFX是一款允许程序支持OFX(财务数据双向交换)命令响应的库。
LibOFX 0.9.11版本中的标签解析功能存在缓冲区溢出漏洞。攻击者可利用借助特制的OFX文件利用该漏洞执行代码或造成拒绝服务(崩溃)。
Severity
中
Formal description
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法: https://github.com/libofx/libofx
Reference
https://nvd.nist.gov/vuln/detail/CVE-2017-2816
Impacted products
| Name | LibOFX LibOFX 0.9.11 |
|---|
{
"bids": {
"bid": {
"bidNumber": "100828"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2017-2816"
}
},
"description": "LibOFX\u662f\u4e00\u6b3e\u5141\u8bb8\u7a0b\u5e8f\u652f\u6301OFX\uff08\u8d22\u52a1\u6570\u636e\u53cc\u5411\u4ea4\u6362\uff09\u547d\u4ee4\u54cd\u5e94\u7684\u5e93\u3002\r\n\r\nLibOFX 0.9.11\u7248\u672c\u4e2d\u7684\u6807\u7b7e\u89e3\u6790\u529f\u80fd\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u501f\u52a9\u7279\u5236\u7684OFX\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4ee3\u7801\u6216\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5d29\u6e83\uff09\u3002",
"discovererName": "Cory Duplantis of Cisco Talos",
"formalWay": "\u76ee\u524d\u5382\u5546\u6682\u672a\u53d1\u5e03\u4fee\u590d\u63aa\u65bd\u89e3\u51b3\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u5efa\u8bae\u4f7f\u7528\u6b64\u8f6f\u4ef6\u7684\u7528\u6237\u968f\u65f6\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u6216\u53c2\u8003\u7f51\u5740\u4ee5\u83b7\u53d6\u89e3\u51b3\u529e\u6cd5\uff1a\r\nhttps://github.com/libofx/libofx",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-33828",
"openTime": "2017-11-14",
"products": {
"product": "LibOFX LibOFX 0.9.11"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2017-2816",
"serverity": "\u4e2d",
"submitTime": "2017-09-14",
"title": "LibOFX\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e"
}
SUSE-SU-2018:2045-1
Vulnerability from csaf_suse - Published: 2018-07-24 07:20 - Updated: 2018-07-24 07:20Summary
Security update for libofx
Severity
Important
Notes
Title of the patch: Security update for libofx
Description of the patch: This update for libofx fixes the following issues:
Security issues fixed:
- CVE-2017-2816: Fix an exploitable buffer overflow vulnerability in the tag parsing functionality (bsc#1058673).
- CVE-2017-2920: Fix a buffer overflow vulnerability in sanitize_proprietary_tags in lib/ofx_preproc.cpp (bsc#1061964).
- CVE-2017-14731: Fix remote denial of service via a crafted file in ofx_proc_file in ofx_preproc.cpp (bsc#1060437).
Patchnames: sdksp4-libofx-13701
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.3 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libofx",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libofx fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2017-2816: Fix an exploitable buffer overflow vulnerability in the tag parsing functionality (bsc#1058673).\n- CVE-2017-2920: Fix a buffer overflow vulnerability in sanitize_proprietary_tags in lib/ofx_preproc.cpp (bsc#1061964).\n- CVE-2017-14731: Fix remote denial of service via a crafted file in ofx_proc_file in ofx_preproc.cpp (bsc#1060437).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-libofx-13701",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2045-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2045-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182045-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2045-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004302.html"
},
{
"category": "self",
"summary": "SUSE Bug 1058673",
"url": "https://bugzilla.suse.com/1058673"
},
{
"category": "self",
"summary": "SUSE Bug 1060437",
"url": "https://bugzilla.suse.com/1060437"
},
{
"category": "self",
"summary": "SUSE Bug 1061964",
"url": "https://bugzilla.suse.com/1061964"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14731 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2816 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2920 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2920/"
}
],
"title": "Security update for libofx",
"tracking": {
"current_release_date": "2018-07-24T07:20:54Z",
"generator": {
"date": "2018-07-24T07:20:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2045-1",
"initial_release_date": "2018-07-24T07:20:54Z",
"revision_history": [
{
"date": "2018-07-24T07:20:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libofx-0.9.0-3.7.1.i586",
"product": {
"name": "libofx-0.9.0-3.7.1.i586",
"product_id": "libofx-0.9.0-3.7.1.i586"
}
},
{
"category": "product_version",
"name": "libofx-devel-0.9.0-3.7.1.i586",
"product": {
"name": "libofx-devel-0.9.0-3.7.1.i586",
"product_id": "libofx-devel-0.9.0-3.7.1.i586"
}
},
{
"category": "product_version",
"name": "libofx4-0.9.0-3.7.1.i586",
"product": {
"name": "libofx4-0.9.0-3.7.1.i586",
"product_id": "libofx4-0.9.0-3.7.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libofx-0.9.0-3.7.1.x86_64",
"product": {
"name": "libofx-0.9.0-3.7.1.x86_64",
"product_id": "libofx-0.9.0-3.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libofx-devel-0.9.0-3.7.1.x86_64",
"product": {
"name": "libofx-devel-0.9.0-3.7.1.x86_64",
"product_id": "libofx-devel-0.9.0-3.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libofx4-0.9.0-3.7.1.x86_64",
"product": {
"name": "libofx4-0.9.0-3.7.1.x86_64",
"product_id": "libofx4-0.9.0-3.7.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-0.9.0-3.7.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.i586"
},
"product_reference": "libofx-0.9.0-3.7.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-0.9.0-3.7.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.x86_64"
},
"product_reference": "libofx-0.9.0-3.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-devel-0.9.0-3.7.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.i586"
},
"product_reference": "libofx-devel-0.9.0-3.7.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-devel-0.9.0-3.7.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.x86_64"
},
"product_reference": "libofx-devel-0.9.0-3.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx4-0.9.0-3.7.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.i586"
},
"product_reference": "libofx4-0.9.0-3.7.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx4-0.9.0-3.7.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.x86_64"
},
"product_reference": "libofx4-0.9.0-3.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-14731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14731"
}
],
"notes": [
{
"category": "general",
"text": "ofx_proc_file in ofx_preproc.cpp in LibOFX 0.9.12 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file, as demonstrated by an ofxdump call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14731",
"url": "https://www.suse.com/security/cve/CVE-2017-14731"
},
{
"category": "external",
"summary": "SUSE Bug 1060437 for CVE-2017-14731",
"url": "https://bugzilla.suse.com/1060437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-24T07:20:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-14731"
},
{
"cve": "CVE-2017-2816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2816"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2816",
"url": "https://www.suse.com/security/cve/CVE-2017-2816"
},
{
"category": "external",
"summary": "SUSE Bug 1058673 for CVE-2017-2816",
"url": "https://bugzilla.suse.com/1058673"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-24T07:20:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-2816"
},
{
"cve": "CVE-2017-2920",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2920"
}
],
"notes": [
{
"category": "general",
"text": "An memory corruption vulnerability exists in the .SVG parsing functionality of Computerinsel Photoline 20.02. A specially crafted .SVG file can cause a vulnerability resulting in memory corruption, which can potentially lead to arbitrary code execution. An attacker can send a specific .SVG file to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2920",
"url": "https://www.suse.com/security/cve/CVE-2017-2920"
},
{
"category": "external",
"summary": "SUSE Bug 1061964 for CVE-2017-2920",
"url": "https://bugzilla.suse.com/1061964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-0.9.0-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx-devel-0.9.0-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libofx4-0.9.0-3.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-24T07:20:54Z",
"details": "important"
}
],
"title": "CVE-2017-2920"
}
]
}
SUSE-SU-2018:2064-1
Vulnerability from csaf_suse - Published: 2018-07-26 14:51 - Updated: 2018-07-26 14:51Summary
Security update for libofx
Severity
Important
Notes
Title of the patch: Security update for libofx
Description of the patch: This update for libofx fixes the following issues:
Security issues fixed:
- CVE-2017-2816: Fix an exploitable buffer overflow vulnerability in the tag parsing functionality (bsc#1058673).
- CVE-2017-2920: Fix a buffer overflow vulnerability in sanitize_proprietary_tags in lib/ofx_preproc.cpp (bsc#1061964).
- CVE-2017-14731: Fix remote denial of service via a crafted file in ofx_proc_file in ofx_preproc.cpp (bsc#1060437).
Patchnames: SUSE-SLE-DESKTOP-12-SP3-2018-1408,SUSE-SLE-SDK-12-SP3-2018-1408,SUSE-SLE-WE-12-SP3-2018-1408
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.3 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libofx",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libofx fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2017-2816: Fix an exploitable buffer overflow vulnerability in the tag parsing functionality (bsc#1058673).\n- CVE-2017-2920: Fix a buffer overflow vulnerability in sanitize_proprietary_tags in lib/ofx_preproc.cpp (bsc#1061964).\n- CVE-2017-14731: Fix remote denial of service via a crafted file in ofx_proc_file in ofx_preproc.cpp (bsc#1060437).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP3-2018-1408,SUSE-SLE-SDK-12-SP3-2018-1408,SUSE-SLE-WE-12-SP3-2018-1408",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2064-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2064-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182064-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2064-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004310.html"
},
{
"category": "self",
"summary": "SUSE Bug 1058673",
"url": "https://bugzilla.suse.com/1058673"
},
{
"category": "self",
"summary": "SUSE Bug 1060437",
"url": "https://bugzilla.suse.com/1060437"
},
{
"category": "self",
"summary": "SUSE Bug 1061964",
"url": "https://bugzilla.suse.com/1061964"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14731 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2816 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2920 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2920/"
}
],
"title": "Security update for libofx",
"tracking": {
"current_release_date": "2018-07-26T14:51:20Z",
"generator": {
"date": "2018-07-26T14:51:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2064-1",
"initial_release_date": "2018-07-26T14:51:20Z",
"revision_history": [
{
"date": "2018-07-26T14:51:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libofx-0.9.9-3.7.1.aarch64",
"product": {
"name": "libofx-0.9.9-3.7.1.aarch64",
"product_id": "libofx-0.9.9-3.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "libofx-devel-0.9.9-3.7.1.aarch64",
"product": {
"name": "libofx-devel-0.9.9-3.7.1.aarch64",
"product_id": "libofx-devel-0.9.9-3.7.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libofx-0.9.9-3.7.1.ppc64le",
"product": {
"name": "libofx-0.9.9-3.7.1.ppc64le",
"product_id": "libofx-0.9.9-3.7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libofx-devel-0.9.9-3.7.1.ppc64le",
"product": {
"name": "libofx-devel-0.9.9-3.7.1.ppc64le",
"product_id": "libofx-devel-0.9.9-3.7.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libofx-0.9.9-3.7.1.s390x",
"product": {
"name": "libofx-0.9.9-3.7.1.s390x",
"product_id": "libofx-0.9.9-3.7.1.s390x"
}
},
{
"category": "product_version",
"name": "libofx-devel-0.9.9-3.7.1.s390x",
"product": {
"name": "libofx-devel-0.9.9-3.7.1.s390x",
"product_id": "libofx-devel-0.9.9-3.7.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libofx-0.9.9-3.7.1.x86_64",
"product": {
"name": "libofx-0.9.9-3.7.1.x86_64",
"product_id": "libofx-0.9.9-3.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libofx6-0.9.9-3.7.1.x86_64",
"product": {
"name": "libofx6-0.9.9-3.7.1.x86_64",
"product_id": "libofx6-0.9.9-3.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libofx-devel-0.9.9-3.7.1.x86_64",
"product": {
"name": "libofx-devel-0.9.9-3.7.1.x86_64",
"product_id": "libofx-devel-0.9.9-3.7.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-0.9.9-3.7.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libofx-0.9.9-3.7.1.x86_64"
},
"product_reference": "libofx-0.9.9-3.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx6-0.9.9-3.7.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libofx6-0.9.9-3.7.1.x86_64"
},
"product_reference": "libofx6-0.9.9-3.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-0.9.9-3.7.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.aarch64"
},
"product_reference": "libofx-0.9.9-3.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-0.9.9-3.7.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.ppc64le"
},
"product_reference": "libofx-0.9.9-3.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-0.9.9-3.7.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.s390x"
},
"product_reference": "libofx-0.9.9-3.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-0.9.9-3.7.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.x86_64"
},
"product_reference": "libofx-0.9.9-3.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-devel-0.9.9-3.7.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.aarch64"
},
"product_reference": "libofx-devel-0.9.9-3.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-devel-0.9.9-3.7.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.ppc64le"
},
"product_reference": "libofx-devel-0.9.9-3.7.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-devel-0.9.9-3.7.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.s390x"
},
"product_reference": "libofx-devel-0.9.9-3.7.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-devel-0.9.9-3.7.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.x86_64"
},
"product_reference": "libofx-devel-0.9.9-3.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-0.9.9-3.7.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:libofx-0.9.9-3.7.1.x86_64"
},
"product_reference": "libofx-0.9.9-3.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx6-0.9.9-3.7.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:libofx6-0.9.9-3.7.1.x86_64"
},
"product_reference": "libofx6-0.9.9-3.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-14731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14731"
}
],
"notes": [
{
"category": "general",
"text": "ofx_proc_file in ofx_preproc.cpp in LibOFX 0.9.12 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file, as demonstrated by an ofxdump call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libofx6-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libofx6-0.9.9-3.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14731",
"url": "https://www.suse.com/security/cve/CVE-2017-14731"
},
{
"category": "external",
"summary": "SUSE Bug 1060437 for CVE-2017-14731",
"url": "https://bugzilla.suse.com/1060437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libofx6-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libofx6-0.9.9-3.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libofx6-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libofx6-0.9.9-3.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-26T14:51:20Z",
"details": "moderate"
}
],
"title": "CVE-2017-14731"
},
{
"cve": "CVE-2017-2816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2816"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libofx6-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libofx6-0.9.9-3.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2816",
"url": "https://www.suse.com/security/cve/CVE-2017-2816"
},
{
"category": "external",
"summary": "SUSE Bug 1058673 for CVE-2017-2816",
"url": "https://bugzilla.suse.com/1058673"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libofx6-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libofx6-0.9.9-3.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libofx6-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libofx6-0.9.9-3.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-26T14:51:20Z",
"details": "moderate"
}
],
"title": "CVE-2017-2816"
},
{
"cve": "CVE-2017-2920",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2920"
}
],
"notes": [
{
"category": "general",
"text": "An memory corruption vulnerability exists in the .SVG parsing functionality of Computerinsel Photoline 20.02. A specially crafted .SVG file can cause a vulnerability resulting in memory corruption, which can potentially lead to arbitrary code execution. An attacker can send a specific .SVG file to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libofx6-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libofx6-0.9.9-3.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2920",
"url": "https://www.suse.com/security/cve/CVE-2017-2920"
},
{
"category": "external",
"summary": "SUSE Bug 1061964 for CVE-2017-2920",
"url": "https://bugzilla.suse.com/1061964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libofx6-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libofx6-0.9.9-3.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libofx6-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libofx-devel-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libofx-0.9.9-3.7.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libofx6-0.9.9-3.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-26T14:51:20Z",
"details": "important"
}
],
"title": "CVE-2017-2920"
}
]
}
OPENSUSE-SU-2024:10964-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
libofx-0.10.1-1.9 on GA media
Severity
Moderate
Notes
Title of the patch: libofx-0.10.1-1.9 on GA media
Description of the patch: These are all security issues fixed in the libofx-0.10.1-1.9 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-10964
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libofx-0.10.1-1.9 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libofx-0.10.1-1.9 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10964",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10964-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14731 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2816 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2816/"
}
],
"title": "libofx-0.10.1-1.9 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10964-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libofx-0.10.1-1.9.aarch64",
"product": {
"name": "libofx-0.10.1-1.9.aarch64",
"product_id": "libofx-0.10.1-1.9.aarch64"
}
},
{
"category": "product_version",
"name": "libofx-devel-0.10.1-1.9.aarch64",
"product": {
"name": "libofx-devel-0.10.1-1.9.aarch64",
"product_id": "libofx-devel-0.10.1-1.9.aarch64"
}
},
{
"category": "product_version",
"name": "libofx7-0.10.1-1.9.aarch64",
"product": {
"name": "libofx7-0.10.1-1.9.aarch64",
"product_id": "libofx7-0.10.1-1.9.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libofx-0.10.1-1.9.ppc64le",
"product": {
"name": "libofx-0.10.1-1.9.ppc64le",
"product_id": "libofx-0.10.1-1.9.ppc64le"
}
},
{
"category": "product_version",
"name": "libofx-devel-0.10.1-1.9.ppc64le",
"product": {
"name": "libofx-devel-0.10.1-1.9.ppc64le",
"product_id": "libofx-devel-0.10.1-1.9.ppc64le"
}
},
{
"category": "product_version",
"name": "libofx7-0.10.1-1.9.ppc64le",
"product": {
"name": "libofx7-0.10.1-1.9.ppc64le",
"product_id": "libofx7-0.10.1-1.9.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libofx-0.10.1-1.9.s390x",
"product": {
"name": "libofx-0.10.1-1.9.s390x",
"product_id": "libofx-0.10.1-1.9.s390x"
}
},
{
"category": "product_version",
"name": "libofx-devel-0.10.1-1.9.s390x",
"product": {
"name": "libofx-devel-0.10.1-1.9.s390x",
"product_id": "libofx-devel-0.10.1-1.9.s390x"
}
},
{
"category": "product_version",
"name": "libofx7-0.10.1-1.9.s390x",
"product": {
"name": "libofx7-0.10.1-1.9.s390x",
"product_id": "libofx7-0.10.1-1.9.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libofx-0.10.1-1.9.x86_64",
"product": {
"name": "libofx-0.10.1-1.9.x86_64",
"product_id": "libofx-0.10.1-1.9.x86_64"
}
},
{
"category": "product_version",
"name": "libofx-devel-0.10.1-1.9.x86_64",
"product": {
"name": "libofx-devel-0.10.1-1.9.x86_64",
"product_id": "libofx-devel-0.10.1-1.9.x86_64"
}
},
{
"category": "product_version",
"name": "libofx7-0.10.1-1.9.x86_64",
"product": {
"name": "libofx7-0.10.1-1.9.x86_64",
"product_id": "libofx7-0.10.1-1.9.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-0.10.1-1.9.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libofx-0.10.1-1.9.aarch64"
},
"product_reference": "libofx-0.10.1-1.9.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-0.10.1-1.9.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libofx-0.10.1-1.9.ppc64le"
},
"product_reference": "libofx-0.10.1-1.9.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-0.10.1-1.9.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libofx-0.10.1-1.9.s390x"
},
"product_reference": "libofx-0.10.1-1.9.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-0.10.1-1.9.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libofx-0.10.1-1.9.x86_64"
},
"product_reference": "libofx-0.10.1-1.9.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-devel-0.10.1-1.9.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.aarch64"
},
"product_reference": "libofx-devel-0.10.1-1.9.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-devel-0.10.1-1.9.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.ppc64le"
},
"product_reference": "libofx-devel-0.10.1-1.9.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-devel-0.10.1-1.9.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.s390x"
},
"product_reference": "libofx-devel-0.10.1-1.9.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx-devel-0.10.1-1.9.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.x86_64"
},
"product_reference": "libofx-devel-0.10.1-1.9.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx7-0.10.1-1.9.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libofx7-0.10.1-1.9.aarch64"
},
"product_reference": "libofx7-0.10.1-1.9.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx7-0.10.1-1.9.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libofx7-0.10.1-1.9.ppc64le"
},
"product_reference": "libofx7-0.10.1-1.9.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx7-0.10.1-1.9.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libofx7-0.10.1-1.9.s390x"
},
"product_reference": "libofx7-0.10.1-1.9.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libofx7-0.10.1-1.9.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libofx7-0.10.1-1.9.x86_64"
},
"product_reference": "libofx7-0.10.1-1.9.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-14731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14731"
}
],
"notes": [
{
"category": "general",
"text": "ofx_proc_file in ofx_preproc.cpp in LibOFX 0.9.12 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file, as demonstrated by an ofxdump call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libofx-0.10.1-1.9.aarch64",
"openSUSE Tumbleweed:libofx-0.10.1-1.9.ppc64le",
"openSUSE Tumbleweed:libofx-0.10.1-1.9.s390x",
"openSUSE Tumbleweed:libofx-0.10.1-1.9.x86_64",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.aarch64",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.ppc64le",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.s390x",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.x86_64",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.aarch64",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.ppc64le",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.s390x",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14731",
"url": "https://www.suse.com/security/cve/CVE-2017-14731"
},
{
"category": "external",
"summary": "SUSE Bug 1060437 for CVE-2017-14731",
"url": "https://bugzilla.suse.com/1060437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libofx-0.10.1-1.9.aarch64",
"openSUSE Tumbleweed:libofx-0.10.1-1.9.ppc64le",
"openSUSE Tumbleweed:libofx-0.10.1-1.9.s390x",
"openSUSE Tumbleweed:libofx-0.10.1-1.9.x86_64",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.aarch64",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.ppc64le",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.s390x",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.x86_64",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.aarch64",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.ppc64le",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.s390x",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libofx-0.10.1-1.9.aarch64",
"openSUSE Tumbleweed:libofx-0.10.1-1.9.ppc64le",
"openSUSE Tumbleweed:libofx-0.10.1-1.9.s390x",
"openSUSE Tumbleweed:libofx-0.10.1-1.9.x86_64",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.aarch64",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.ppc64le",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.s390x",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.x86_64",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.aarch64",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.ppc64le",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.s390x",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-14731"
},
{
"cve": "CVE-2017-2816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2816"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libofx-0.10.1-1.9.aarch64",
"openSUSE Tumbleweed:libofx-0.10.1-1.9.ppc64le",
"openSUSE Tumbleweed:libofx-0.10.1-1.9.s390x",
"openSUSE Tumbleweed:libofx-0.10.1-1.9.x86_64",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.aarch64",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.ppc64le",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.s390x",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.x86_64",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.aarch64",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.ppc64le",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.s390x",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2816",
"url": "https://www.suse.com/security/cve/CVE-2017-2816"
},
{
"category": "external",
"summary": "SUSE Bug 1058673 for CVE-2017-2816",
"url": "https://bugzilla.suse.com/1058673"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libofx-0.10.1-1.9.aarch64",
"openSUSE Tumbleweed:libofx-0.10.1-1.9.ppc64le",
"openSUSE Tumbleweed:libofx-0.10.1-1.9.s390x",
"openSUSE Tumbleweed:libofx-0.10.1-1.9.x86_64",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.aarch64",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.ppc64le",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.s390x",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.x86_64",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.aarch64",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.ppc64le",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.s390x",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libofx-0.10.1-1.9.aarch64",
"openSUSE Tumbleweed:libofx-0.10.1-1.9.ppc64le",
"openSUSE Tumbleweed:libofx-0.10.1-1.9.s390x",
"openSUSE Tumbleweed:libofx-0.10.1-1.9.x86_64",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.aarch64",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.ppc64le",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.s390x",
"openSUSE Tumbleweed:libofx-devel-0.10.1-1.9.x86_64",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.aarch64",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.ppc64le",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.s390x",
"openSUSE Tumbleweed:libofx7-0.10.1-1.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-2816"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…