ALT-BU-2015-2587-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2014-9732
The cabd_extract function in cabd.c in libmspack before 0.5 does not properly maintain decompression callbacks in certain cases where an invalid file follows a valid file, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted CAB archive.
Modified: 2025-04-12
CVE-2015-4467
The chmd_init_decomp function in chmd.c in libmspack before 0.5 does not properly validate the reset interval, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted CHM file.
- http://anonscm.debian.org/cgit/collab-maint/libmspack.git/diff/debian/patches/fix-division-by-zero.patch?id=a25bb144795e526748b57884daf365732c7e2295
- http://openwall.com/lists/oss-security/2015/02/03/11
- http://www.securityfocus.com/bid/72488
- https://bugs.debian.org/774725
- http://anonscm.debian.org/cgit/collab-maint/libmspack.git/diff/debian/patches/fix-division-by-zero.patch?id=a25bb144795e526748b57884daf365732c7e2295
- http://openwall.com/lists/oss-security/2015/02/03/11
- http://www.securityfocus.com/bid/72488
- https://bugs.debian.org/774725
Modified: 2025-04-12
CVE-2015-4468
Multiple integer overflows in the search_chunk function in chmd.c in libmspack before 0.5 allow remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CHM file.
- http://anonscm.debian.org/cgit/collab-maint/libmspack.git/diff/debian/patches/fix-pointer-arithmetic-overflow.patch?id=a25bb144795e526748b57884daf365732c7e2295
- http://openwall.com/lists/oss-security/2015/02/03/11
- http://www.securityfocus.com/bid/72486
- https://bugs.debian.org/774726
- http://anonscm.debian.org/cgit/collab-maint/libmspack.git/diff/debian/patches/fix-pointer-arithmetic-overflow.patch?id=a25bb144795e526748b57884daf365732c7e2295
- http://openwall.com/lists/oss-security/2015/02/03/11
- http://www.securityfocus.com/bid/72486
- https://bugs.debian.org/774726
Modified: 2025-04-12
CVE-2015-4469
The chmd_read_headers function in chmd.c in libmspack before 0.5 does not validate name lengths, which allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CHM file.
- http://anonscm.debian.org/cgit/collab-maint/libmspack.git/diff/debian/patches/fix-name-field-boundaries.patch?id=a25bb144795e526748b57884daf365732c7e2295
- http://openwall.com/lists/oss-security/2015/02/03/11
- http://www.securityfocus.com/bid/72486
- https://bugs.debian.org/774726
- http://anonscm.debian.org/cgit/collab-maint/libmspack.git/diff/debian/patches/fix-name-field-boundaries.patch?id=a25bb144795e526748b57884daf365732c7e2295
- http://openwall.com/lists/oss-security/2015/02/03/11
- http://www.securityfocus.com/bid/72486
- https://bugs.debian.org/774726
Modified: 2025-04-12
CVE-2015-4470
Off-by-one error in the inflate function in mszipd.c in libmspack before 0.5 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CAB archive.
Modified: 2025-04-12
CVE-2015-4471
Off-by-one error in the lzxd_decompress function in lzxd.c in libmspack before 0.5 allows remote attackers to cause a denial of service (buffer under-read and application crash) via a crafted CAB archive.
- http://openwall.com/lists/oss-security/2015/02/03/11
- http://www.securityfocus.com/bid/72492
- https://bugs.debian.org/775499
- https://github.com/kyz/libmspack/commit/18b6a2cc0b87536015bedd4f7763e6b02d5aa4f3
- http://openwall.com/lists/oss-security/2015/02/03/11
- http://www.securityfocus.com/bid/72492
- https://bugs.debian.org/775499
- https://github.com/kyz/libmspack/commit/18b6a2cc0b87536015bedd4f7763e6b02d5aa4f3
Modified: 2025-04-12
CVE-2015-4472
Off-by-one error in the READ_ENCINT macro in chmd.c in libmspack before 0.5 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted CHM file.
- http://openwall.com/lists/oss-security/2015/02/03/11
- http://www.securityfocus.com/bid/72490
- https://bugs.debian.org/775687
- https://security.gentoo.org/glsa/201506-01
- http://openwall.com/lists/oss-security/2015/02/03/11
- http://www.securityfocus.com/bid/72490
- https://bugs.debian.org/775687
- https://security.gentoo.org/glsa/201506-01
Package libxerces-c updated to version 3.1.2-alt1 for branch sisyphus in task 147754.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-0252
internal/XMLReader.cpp in Apache Xerces-C before 3.1.2 allows remote attackers to cause a denial of service (segmentation fault and crash) via crafted XML data.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152882.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153094.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153829.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153887.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153903.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153923.html
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00012.html
- http://packetstormsecurity.com/files/131756/Apache-Xerces-C-XML-Parser-Denial-Of-Service.html
- http://rhn.redhat.com/errata/RHSA-2015-1193.html
- http://www.debian.org/security/2015/dsa-3199
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securityfocus.com/bid/73252
- http://www.securitytracker.com/id/1032254
- http://xerces.apache.org/xerces-c/secadv/CVE-2015-0252.txt
- https://shibboleth.net/community/advisories/secadv_20150319.txt
- https://www.exploit-db.com/exploits/36906/
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152882.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153094.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153829.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153887.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153903.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153923.html
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00012.html
- http://packetstormsecurity.com/files/131756/Apache-Xerces-C-XML-Parser-Denial-Of-Service.html
- http://rhn.redhat.com/errata/RHSA-2015-1193.html
- http://www.debian.org/security/2015/dsa-3199
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securityfocus.com/bid/73252
- http://www.securitytracker.com/id/1032254
- http://xerces.apache.org/xerces-c/secadv/CVE-2015-0252.txt
- https://shibboleth.net/community/advisories/secadv_20150319.txt
- https://www.exploit-db.com/exploits/36906/