First published: Wed Jan 24 2018(Updated: )
Richard Hughes discovered that gcab incorrectly handled certain malformed cabinet files. If a user or automated system were tricked into opening a specially crafted cabinet file, a remote attacker could use this issue to cause gcab to crash, resulting in a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/gcab | <0.7-4ubuntu0.1 | 0.7-4ubuntu0.1 |
Ubuntu | =17.10 | |
All of | ||
ubuntu/libgcab-1.0-0 | <0.7-4ubuntu0.1 | 0.7-4ubuntu0.1 |
Ubuntu | =17.10 | |
All of | ||
ubuntu/gcab | <0.7-1ubuntu0.1 | 0.7-1ubuntu0.1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/libgcab-1.0-0 | <0.7-1ubuntu0.1 | 0.7-1ubuntu0.1 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-3546-1 is categorized as important due to the denial of service vulnerability.
To fix USN-3546-1, update to gcab version 0.7-4ubuntu0.1 or libgcab-1.0-0 version 0.7-4ubuntu0.1 for Ubuntu 17.10 and to versions 0.7-1ubuntu0.1 for Ubuntu 16.04.
USN-3546-1 affects Ubuntu 16.04 and 17.10 specifically for the gcab and libgcab packages.
The risks associated with USN-3546-1 include potential denial of service from crashing the gcab application via specially crafted cabinet files.
The vulnerability in USN-3546-1 was discovered by Richard Hughes.