{"id":"MGASA-2018-0368","summary":"Updated sleuthkit packages fix security vulnerabilities","details":"Updated sleuthkit packages fix security vulnerabilities:\n\nIn The Sleuth Kit (TSK) 4.4.2, opening a crafted ISO 9660 image triggers\nan out-of-bounds read in iso9660_proc_dir() in tsk/fs/iso9660_dent.c in\nlibtskfs.a, as demonstrated by fls (CVE-2017-13755).\n\nIn The Sleuth Kit (TSK) 4.4.2, opening a crafted disk image triggers\ninfinite recursion in dos_load_ext_table() in tsk/vs/dos.c in libtskvs.a,\nas demonstrated by mmls (CVE-2017-13756).\n\nIn The Sleuth Kit (TSK) 4.4.2, fls hangs on a corrupt exfat image in\ntsk_img_read() in tsk/img/img_io.c in libtskimg.a (CVE-2017-13760).\n\nAn issue was discovered in libtskfs.a in The Sleuth Kit (TSK) from release\n4.0.2 through to 4.6.1. An out-of-bounds read of a memory region was found\nin the function ntfs_fix_idxrec in tsk/fs/ntfs_dent.cpp which could be\nleveraged by an attacker to disclose information or manipulated to read\nfrom unmapped memory causing a denial of service (CVE-2018-11737).\n\nAn issue was discovered in libtskfs.a in The Sleuth Kit (TSK) from release\n4.0.2 through to 4.6.1. An out-of-bounds read of a memory region was found\nin the function ntfs_make_data_run in tsk/fs/ntfs.c which could be\nleveraged by an attacker to disclose information or manipulated to read\nfrom unmapped memory causing a denial of service attack (CVE-2018-11738).\n\nAn issue was discovered in libtskimg.a in The Sleuth Kit (TSK) from release\n4.0.2 through to 4.6.1. An out-of-bounds read of a memory region was found\nin the function raw_read in tsk/img/raw.c which could be leveraged by an\nattacker to disclose information or manipulated to read from unmapped\nmemory causing a denial of service attack (CVE-2018-11739).\n\nAn issue was discovered in libtskbase.a in The Sleuth Kit (TSK) from\nrelease 4.0.2 through to 4.6.1. An out-of-bounds read of a memory region\nwas found in the function tsk_UTF16toUTF8 in tsk/base/tsk_unicode.c which\ncould be leveraged by an attacker to disclose information or manipulated\nto read from unmapped memory causing a denial of service attack\n(CVE-2018-11740).\n","modified":"2026-04-16T06:25:43.425131829Z","published":"2018-09-07T10:15:03Z","upstream":["CVE-2017-13755","CVE-2017-13756","CVE-2017-13760","CVE-2018-11737","CVE-2018-11738","CVE-2018-11739","CVE-2018-11740"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2018-0368.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=23501"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/VEGCW34ZQ2RZ3OUDKF3BGXNLDPAIX6YM/"}],"affected":[{"package":{"name":"sleuthkit","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/sleuthkit?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.6.2-2.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2018-0368.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}