Arch Linux Security Advisory ASA-201807-16
=========================================
Severity: Medium
Date    : 2018-07-26
CVE-ID  : CVE-2017-17440
Package : libextractor
Type    : denial of service
Remote  : Yes
Link    : https://security.archlinux.org/AVG-541

Summary
======
The package libextractor before version 1.7-1 is vulnerable to denial
of service.

Resolution
=========
Upgrade to 1.7-1.

# pacman -Syu "libextractor>=1.7-1"

The problem has been fixed upstream in version 1.7.

Workaround
=========
None.

Description
==========
GNU Libextractor 1.6 allows remote attackers to cause a denial of
service (NULL pointer dereference and application crash) via a crafted
GIF, IT (Impulse Tracker), NSFE, S3M (Scream Tracker 3), SID, or XM
(eXtended Module) file, as demonstrated by the
EXTRACTOR_xm_extract_method function in plugins/xm_extractor.c.

Impact
=====
A remote attacker is able to crash the application via a specially
crafted file.

References
=========
https://www.gnunet.org/en/
https://security.archlinux.org/CVE-2017-17440

ArchLinux: 201807-16: libextractor: denial of service

July 28, 2018

Summary

GNU Libextractor 1.6 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted GIF, IT (Impulse Tracker), NSFE, S3M (Scream Tracker 3), SID, or XM (eXtended Module) file, as demonstrated by the EXTRACTOR_xm_extract_method function in plugins/xm_extractor.c.

Resolution

Upgrade to 1.7-1. # pacman -Syu "libextractor>=1.7-1"
The problem has been fixed upstream in version 1.7.

References

https://www.gnunet.org/en/ https://security.archlinux.org/CVE-2017-17440

Severity
Package : libextractor
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-541

Workaround

None.

Related News