ID CVE-2018-5345
Summary A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.
References
Vulnerable Configurations
  • cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gcab:0.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gcab:0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnome:gcab:0.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:gcab:0.7.4:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 24-08-2020 - 17:37)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
redhat via4
advisories
bugzilla
id 1527296
title CVE-2018-5345 gcab: Extracting malformed .cab files causes stack smashing potentially leading to arbitrary code execution
oval
OR
  • comment Red Hat Enterprise Linux must be installed
    oval oval:com.redhat.rhba:tst:20070304026
  • AND
    • comment Red Hat Enterprise Linux 7 is installed
      oval oval:com.redhat.rhba:tst:20150364027
    • OR
      • AND
        • comment gcab is earlier than 0:0.7-4.el7_4
          oval oval:com.redhat.rhsa:tst:20180350001
        • comment gcab is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20180350002
      • AND
        • comment libgcab1 is earlier than 0:0.7-4.el7_4
          oval oval:com.redhat.rhsa:tst:20180350003
        • comment libgcab1 is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20180350004
      • AND
        • comment libgcab1-devel is earlier than 0:0.7-4.el7_4
          oval oval:com.redhat.rhsa:tst:20180350005
        • comment libgcab1-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20180350006
rhsa
id RHSA-2018:0350
released 2018-02-26
severity Important
title RHSA-2018:0350: gcab security update (Important)
rpms
  • gcab-0:0.7-4.el7_4
  • gcab-debuginfo-0:0.7-4.el7_4
  • libgcab1-0:0.7-4.el7_4
  • libgcab1-devel-0:0.7-4.el7_4
refmap via4
debian DSA-4095
misc https://bugzilla.redhat.com/show_bug.cgi?id=1527296
ubuntu USN-3546-1
Last major update 24-08-2020 - 17:37
Published 12-01-2018 - 00:29
Last modified 24-08-2020 - 17:37
Back to Top