First published: Tue Aug 16 2016(Updated: )
The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/lcms2 | <2.8-4 | 2.8-4 |
ubuntu/lcms2 | <2.5-0ubuntu4.2 | 2.5-0ubuntu4.2 |
ubuntu/lcms2 | <2.8-4 | 2.8-4 |
ubuntu/lcms2 | <2.6-3ubuntu2.1 | 2.6-3ubuntu2.1 |
ubuntu/openjdk-7 | <7 | 7 |
ubuntu/openjdk-7 | <7 | 7 |
debian/lcms2 | 2.12~rc1-2 2.14-2 | |
Little CMS Color engine | ||
Debian GNU/Linux | =8.0 | |
openSUSE | =42.1 | |
Little CMS Color engine | <2.11 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Debian | =8.0 | |
redhat satellite | =5.8 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server eus | =7.3 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server eus | =7.7 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux server tus | =7.7 | |
redhat enterprise Linux workstation | =5.0 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
netapp active iq unified manager windows | >=7.3 | |
NetApp Active IQ Unified Manager for VMware vSphere | >=9.5 | |
NetApp E-Series SANtricity Management | ||
NetApp E-Series SANtricity Management | ||
NetApp E-Series SANtricity Management for VMware vCenter | ||
NetApp E-Series SANtricity OS Controller | =11.0 | |
NetApp E-Series SANtricity OS Controller | =11.0.0 | |
NetApp E-Series SANtricity OS Controller | =11.20 | |
NetApp E-Series SANtricity OS Controller | =11.25 | |
NetApp E-Series SANtricity OS Controller | =11.30 | |
NetApp E-Series SANtricity OS Controller | =11.30.5r3 | |
NetApp E-Series SANtricity OS Controller | =11.40 | |
NetApp E-Series SANtricity OS Controller | =11.40.3r2 | |
NetApp E-Series SANtricity OS Controller | =11.40.5 | |
NetApp E-Series SANtricity OS Controller | =11.50.1 | |
NetApp E-Series SANtricity OS Controller | =11.50.2 | |
NetApp E-Series SANtricity OS Controller | =11.50.2-p1 | |
NetApp E-Series SANtricity OS Controller | =11.60 | |
NetApp E-Series SANtricity OS Controller | =11.60.0 | |
NetApp E-Series SANtricity OS Controller | =11.60.1 | |
NetApp E-Series SANtricity OS Controller | =11.60.3 | |
NetApp E-Series SANtricity OS Controller | =11.70.1 | |
NetApp E-Series SANtricity OS Controller | =11.70.2 | |
NetApp OnCommand Balance | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Performance Manager | ||
NetApp OnCommand Shift | ||
NetApp OnCommand Unified Manager for 7-Mode | ||
NetApp OnCommand Unified Manager for vSphere | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10165 is classified as a moderate severity vulnerability that can lead to information disclosure or denial of service.
To fix CVE-2016-10165, update Little CMS to version 2.8-4 or later if using Ubuntu, or ensure the latest patches are applied for affected distributions.
The potential impacts of CVE-2016-10165 include the possibility for remote attackers to read sensitive data or cause a denial of service via a specially crafted ICC profile.
CVE-2016-10165 affects various versions of Little CMS and specific distributions such as Ubuntu, Debian, and Red Hat Enterprise Linux.
While updating is the best solution for CVE-2016-10165, a temporary workaround includes implementing network level controls to block untrusted ICC profile processing.