【CESA-2017:083】最新バージョンのicoutilsが、Red Hat Enterprise Linux 7 からご利用いただけるようになりました

CESA-2017:0837

最新バージョンのicoutilsが、Red Hat Enterprise Linux 7 からご利用いただけるようになりました。

Red Hat製品のセキュリティ及び品質は大変ご好評いただいております。

今回の最新バージョンVulnerability Scoring System(CVSS)は、各セキュリティホールへのアクセス安全面を厳重にクラス分けし、確実・安全に詳細レポートをお送りいたします。参照セクションのリンクをクリックしてください。

The icoutils are a set of programs for extracting and converting images in
Microsoft Windows icon and cursor files. These files usually have the extension
.ico or .cur, but they can also be embedded in executables or libraries.

Security Fix(es):

* Multiple vulnerabilities were found in icoutils, in the wrestool program. An
attacker could create a crafted executable that, when read by wrestool, could
result in memory corruption leading to a crash or potential code execution.
(CVE-2017-5208, CVE-2017-5333, CVE-2017-6009)

* A vulnerability was found in icoutils, in the wrestool program. An attacker
could create a crafted executable that, when read by wrestool, could result in
failure to allocate memory or an over-large memcpy operation, leading to a
crash. (CVE-2017-5332)

* Multiple vulnerabilities were found in icoutils, in the icotool program. An
attacker could create a crafted ICO or CUR file that, when read by icotool,
could result in memory corruption leading to a crash or potential code
execution. (CVE-2017-6010, CVE-2017-6011)

Bugs fixed

1411251 – CVE-2017-5208 icoutils: Check_offset overflow on 64-bit systems
1412259 – CVE-2017-5333 icoutils: Integer overflow vulnerability in extract.c
1412263 – CVE-2017-5332 icoutils: Access to unallocated memory possible in extract.c
1422906 – CVE-2017-6009 icoutils: Buffer overflow in the decode_ne_resource_id function
1422907 – CVE-2017-6010 icoutils: Buffer overflow in the extract_icons function
1422908 – CVE-2017-6011 icoutils: Buffer overflow in the simple_vec function