Bug 1034675 (CVE-2017-5662)

Summary: VUL-1: CVE-2017-5662: batik,xmlgraphics-batik: [CVE-2017-5662] Apache Batik information disclosure vulnerability
Product: [Novell Products] SUSE Security Incidents Reporter: Marcus Meissner <meissner>
Component: IncidentsAssignee: Fridrich Strba <fstrba>
Status: IN_PROGRESS --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P4 - Low CC: meissner, sknorr, smash_bz
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/183756/
Whiteboard: CVSSv2:SUSE:CVE-2017-5662:3.6:(AV:L/AC:L/Au:N/C:P/I:N/A:P) CVSSv3.1:SUSE:CVE-2017-5662:7.5:(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Marcus Meissner 2017-04-18 15:22:27 UTC
CVE-2017-5662
        Apache Batik information disclosure vulnerability


Severity:
        Medium

Vendor:
       The Apache Software Foundation


Versions Affected:
        Batik 1.0 - 1.8
 
Description:
        Files lying on the filesystem of the server which uses batik can
        be revealed to arbitrary users who send maliciously formed SVG
        files. The file types that can be shown depend on the user context
        in which the exploitable application is running. If the user is root
        a full compromise of the server--including confidential or sensitive
        files--would be possible.
 
        XXE can also be used to attack the availability of the server
        via denial of service as the references within a xml document
        can trivially trigger an amplification attack.
 
Mitigation:
        Users should upgrade to Batik 1.9+


Credit:
        This issue was independently reported by Lars Krapf of Adobe and
Pierre Ernst at Salesforce.
 

References:
        http://xmlgraphics.apache.org/security.html

The Apache XML Graphics team.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5662
http://seclists.org/oss-sec/2017/q2/85
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5662
Comment 1 Stefan Knorr 2019-10-25 10:53:52 UTC
So, looking at this:

* Leap 15.1 is fixed
* SLE 15 GA and SP1 are fixed
* SLE 12 SP3/SP4/SP5 still have Batik 1.8

Toms, could you maybe submit the new package into SUSE:SLE-12-SP3:Update then?