Bug 1173586 - (CVE-2018-3849) VUL-0: CVE-2018-3849: cfitsio: Stack-based buffer overflow in ffghtb() allows for potential code execution
(CVE-2018-3849)
VUL-0: CVE-2018-3849: cfitsio: Stack-based buffer overflow in ffghtb() allows...
Status: RESOLVED INVALID
Classification: openSUSE
Product: openSUSE Distribution
Classification: openSUSE
Component: Security
Leap 15.1
Other Other
: P5 - None : Major (vote)
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/204062/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2020-07-01 14:58 UTC by Alexandros Toptsoglou
Modified: 2020-07-01 14:58 UTC (History)
0 users

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexandros Toptsoglou 2020-07-01 14:58:02 UTC
CVE-2018-3849

NASA CFITSIO prior to 3.43 is affected by: Buffer Overflow. The impact is: arbitrary code execution. The component is: over 40 source code files were changed. The attack vector is: remote unauthenticated attacker. The fixed version is: 3.43. NOTE: this CVE refers to the issues not covered by CVE-2018-3846, CVE-2018-3847, CVE-2018-3848, and CVE-2018-3849. One example is ftp_status in drvrnet.c mishandling a long string beginning with a '4' character.

Upstream pull request:

https://github.com/astropy/astropy/pull/7274

References:

https://heasarc.gsfc.nasa.gov/FTP/software/fitsio/c/cfitsio3420.tar.gz
https://heasarc.gsfc.nasa.gov/FTP/software/fitsio/c/cfitsio3430.tar.gz
https://heasarc.gsfc.nasa.gov/FTP/software/fitsio/c/docs/changes2.txt
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892458

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1850866
https://bugzilla.redhat.com/show_bug.cgi?id=1568185
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-3849
https://access.redhat.com/security/cve/CVE-2018-3849
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-3849.html
http://www.cvedetails.com/cve/CVE-2018-3849/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3849
Comment 1 Alexandros Toptsoglou 2020-07-01 14:58:13 UTC
We ship the version 2.44 in Leap 15.1 and 15.2 and 3.47 in TW which are already fixed.