Security Advisory Important: icoutils security update

Advisory: RHSA-2017:0837-1
Type: Security Advisory
Severity: Important
Issued on: 2017-03-23
Last updated on: 2017-03-23
Affected Products: Red Hat Enterprise Linux Desktop (v. 7)
Red Hat Enterprise Linux HPC Node (v. 7)
Red Hat Enterprise Linux Server (v. 7)
Red Hat Enterprise Linux Server TUS (v. 7.3)
Red Hat Enterprise Linux Workstation (v. 7)
CVEs (cve.mitre.org): CVE-2017-5208
CVE-2017-5332
CVE-2017-5333
CVE-2017-6009
CVE-2017-6010
CVE-2017-6011

Details

An update for icoutils is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.

The icoutils are a set of programs for extracting and converting images in
Microsoft Windows icon and cursor files. These files usually have the extension
.ico or .cur, but they can also be embedded in executables or libraries.

Security Fix(es):

* Multiple vulnerabilities were found in icoutils, in the wrestool program. An
attacker could create a crafted executable that, when read by wrestool, could
result in memory corruption leading to a crash or potential code execution.
(CVE-2017-5208, CVE-2017-5333, CVE-2017-6009)

* A vulnerability was found in icoutils, in the wrestool program. An attacker
could create a crafted executable that, when read by wrestool, could result in
failure to allocate memory or an over-large memcpy operation, leading to a
crash. (CVE-2017-5332)

* Multiple vulnerabilities were found in icoutils, in the icotool program. An
attacker could create a crafted ICO or CUR file that, when read by icotool,
could result in memory corruption leading to a crash or potential code
execution. (CVE-2017-6010, CVE-2017-6011)


Solution

For details on how to apply this update, which includes the changes described in
this advisory, refer to:

https://access.redhat.com/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 7)

SRPMS:
icoutils-0.31.3-1.el7_3.src.rpm     MD5: 6edbbeba5fa0600d27f58660ab609e8d
SHA-256: 7dbce049bb2e4b3cf01383bc1af4da5d9541c6e27d26524020f0c44c7677e663
 
x86_64:
icoutils-0.31.3-1.el7_3.x86_64.rpm     MD5: f5b7f6acea655cc0536ce73f43ed82e2
SHA-256: 5e64a45f3d6bfc54e466f8ecc6bc97322133ded2cb843d854179f4b34b313436
icoutils-debuginfo-0.31.3-1.el7_3.x86_64.rpm     MD5: 625cba992c10ee8f1063569f925edcfe
SHA-256: c9bd7647d08fd2e2d5ca0393e762ffe5ff46886ae2a155ca7bebc6e55c95dfc7
 
Red Hat Enterprise Linux HPC Node (v. 7)

SRPMS:
icoutils-0.31.3-1.el7_3.src.rpm     MD5: 6edbbeba5fa0600d27f58660ab609e8d
SHA-256: 7dbce049bb2e4b3cf01383bc1af4da5d9541c6e27d26524020f0c44c7677e663
 
x86_64:
icoutils-0.31.3-1.el7_3.x86_64.rpm     MD5: f5b7f6acea655cc0536ce73f43ed82e2
SHA-256: 5e64a45f3d6bfc54e466f8ecc6bc97322133ded2cb843d854179f4b34b313436
icoutils-debuginfo-0.31.3-1.el7_3.x86_64.rpm     MD5: 625cba992c10ee8f1063569f925edcfe
SHA-256: c9bd7647d08fd2e2d5ca0393e762ffe5ff46886ae2a155ca7bebc6e55c95dfc7
 
Red Hat Enterprise Linux Server (v. 7)

SRPMS:
icoutils-0.31.3-1.el7_3.src.rpm     MD5: 6edbbeba5fa0600d27f58660ab609e8d
SHA-256: 7dbce049bb2e4b3cf01383bc1af4da5d9541c6e27d26524020f0c44c7677e663
 
PPC:
icoutils-0.31.3-1.el7_3.ppc64.rpm     MD5: 97c5d833b9a2b5c911fd30b1f189a228
SHA-256: dafb6eb69e124798323cbafb3b255cc1e864fbd6d7be9556346d5e3dfd62a0e7
icoutils-debuginfo-0.31.3-1.el7_3.ppc64.rpm     MD5: 8f6786b85d927063558f259392c616cb
SHA-256: 954987a9b9f624f074831cf99f9835d6e87d14e82131bf3cc97104044f335adb
 
PPC64LE:
icoutils-0.31.3-1.el7_3.ppc64le.rpm     MD5: c829be0968a44f80a6241686eb555363
SHA-256: 648f3eebbe7abe1d4955e44a05e6abd552e795551becbfd1cbc7ce09ec9160df
icoutils-debuginfo-0.31.3-1.el7_3.ppc64le.rpm     MD5: 83724803d24b765a359512eed7635464
SHA-256: 7391e37ad1a5fa8c1b9ba92e657e411df8a44e877f499e2c22c94d7be1bdeb41
 
s390x:
icoutils-0.31.3-1.el7_3.s390x.rpm     MD5: 4e2e5ce1354a1e745ef036f6aaba1db7
SHA-256: 14a1951a3e8812208a967fbcf3498640ff9004822e98d46fbec3b72f02acffd2
icoutils-debuginfo-0.31.3-1.el7_3.s390x.rpm     MD5: f1a2cd53de0c55c0d0078715c5969cff
SHA-256: f1b7a5fd5bdd19ae0997a22e6501ac3dfd818b651bd787c32fe42910d01ca60a
 
x86_64:
icoutils-0.31.3-1.el7_3.x86_64.rpm     MD5: f5b7f6acea655cc0536ce73f43ed82e2
SHA-256: 5e64a45f3d6bfc54e466f8ecc6bc97322133ded2cb843d854179f4b34b313436
icoutils-debuginfo-0.31.3-1.el7_3.x86_64.rpm     MD5: 625cba992c10ee8f1063569f925edcfe
SHA-256: c9bd7647d08fd2e2d5ca0393e762ffe5ff46886ae2a155ca7bebc6e55c95dfc7
 
Red Hat Enterprise Linux Server TUS (v. 7.3)

SRPMS:
icoutils-0.31.3-1.el7_3.src.rpm     MD5: 6edbbeba5fa0600d27f58660ab609e8d
SHA-256: 7dbce049bb2e4b3cf01383bc1af4da5d9541c6e27d26524020f0c44c7677e663
 
x86_64:
icoutils-0.31.3-1.el7_3.x86_64.rpm     MD5: f5b7f6acea655cc0536ce73f43ed82e2
SHA-256: 5e64a45f3d6bfc54e466f8ecc6bc97322133ded2cb843d854179f4b34b313436
icoutils-debuginfo-0.31.3-1.el7_3.x86_64.rpm     MD5: 625cba992c10ee8f1063569f925edcfe
SHA-256: c9bd7647d08fd2e2d5ca0393e762ffe5ff46886ae2a155ca7bebc6e55c95dfc7
 
Red Hat Enterprise Linux Workstation (v. 7)

SRPMS:
icoutils-0.31.3-1.el7_3.src.rpm     MD5: 6edbbeba5fa0600d27f58660ab609e8d
SHA-256: 7dbce049bb2e4b3cf01383bc1af4da5d9541c6e27d26524020f0c44c7677e663
 
x86_64:
icoutils-0.31.3-1.el7_3.x86_64.rpm     MD5: f5b7f6acea655cc0536ce73f43ed82e2
SHA-256: 5e64a45f3d6bfc54e466f8ecc6bc97322133ded2cb843d854179f4b34b313436
icoutils-debuginfo-0.31.3-1.el7_3.x86_64.rpm     MD5: 625cba992c10ee8f1063569f925edcfe
SHA-256: c9bd7647d08fd2e2d5ca0393e762ffe5ff46886ae2a155ca7bebc6e55c95dfc7
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1411251 - CVE-2017-5208 icoutils: Check_offset overflow on 64-bit systems
1412259 - CVE-2017-5333 icoutils: Integer overflow vulnerability in extract.c
1412263 - CVE-2017-5332 icoutils: Access to unallocated memory possible in extract.c
1422906 - CVE-2017-6009 icoutils: Buffer overflow in the decode_ne_resource_id function
1422907 - CVE-2017-6010 icoutils: Buffer overflow in the extract_icons function
1422908 - CVE-2017-6011 icoutils: Buffer overflow in the simple_vec function


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/