Vulnerabilites related to libimobiledevice - libplist
cve-2017-5834
Vulnerability from cvelistv5
Published
2017-03-03 15:00
Modified
2024-08-05 15:11
Severity ?
EPSS score ?
Summary
The parse_dict_node function in bplist.c in libplist allows attackers to cause a denial of service (out-of-bounds heap read and crash) via a crafted file.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/96022 | vdb-entry, x_refsource_BID | |
https://github.com/libimobiledevice/libplist/issues/89 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2017/01/31/6 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2017/02/02/4 | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:11:48.909Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "96022", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/96022", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/libimobiledevice/libplist/issues/89", }, { name: "[oss-security] 20170131 CVE request: multiples vulnerabilities in libplist", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2017/01/31/6", }, { name: "[oss-security] 20170202 Re: CVE request: multiples vulnerabilities in libplist", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2017/02/02/4", }, { name: "[debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-01-17T00:00:00", descriptions: [ { lang: "en", value: "The parse_dict_node function in bplist.c in libplist allows attackers to cause a denial of service (out-of-bounds heap read and crash) via a crafted file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-04-02T09:06:05", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "96022", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/96022", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/libimobiledevice/libplist/issues/89", }, { name: "[oss-security] 20170131 CVE request: multiples vulnerabilities in libplist", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2017/01/31/6", }, { name: "[oss-security] 20170202 Re: CVE request: multiples vulnerabilities in libplist", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2017/02/02/4", }, { name: "[debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-5834", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The parse_dict_node function in bplist.c in libplist allows attackers to cause a denial of service (out-of-bounds heap read and crash) via a crafted file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "96022", refsource: "BID", url: "http://www.securityfocus.com/bid/96022", }, { name: "https://github.com/libimobiledevice/libplist/issues/89", refsource: "CONFIRM", url: "https://github.com/libimobiledevice/libplist/issues/89", }, { name: "[oss-security] 20170131 CVE request: multiples vulnerabilities in libplist", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2017/01/31/6", }, { name: "[oss-security] 20170202 Re: CVE request: multiples vulnerabilities in libplist", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2017/02/02/4", }, { name: "[debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-5834", datePublished: "2017-03-03T15:00:00", dateReserved: "2017-02-01T00:00:00", dateUpdated: "2024-08-05T15:11:48.909Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-5209
Vulnerability from cvelistv5
Published
2017-01-11 16:00
Modified
2024-08-05 14:55
Severity ?
EPSS score ?
Summary
The base64decode function in base64.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via split encoded Apple Property List data.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/95385 | vdb-entry, x_refsource_BID | |
https://github.com/libimobiledevice/libplist/commit/3a55ddd3c4c11ce75a86afbefd085d8d397ff957 | x_refsource_CONFIRM | |
https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T14:55:35.757Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "95385", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/95385", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/libimobiledevice/libplist/commit/3a55ddd3c4c11ce75a86afbefd085d8d397ff957", }, { name: "[debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-01-11T00:00:00", descriptions: [ { lang: "en", value: "The base64decode function in base64.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via split encoded Apple Property List data.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-04-02T09:06:04", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "95385", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/95385", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/libimobiledevice/libplist/commit/3a55ddd3c4c11ce75a86afbefd085d8d397ff957", }, { name: "[debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-5209", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The base64decode function in base64.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via split encoded Apple Property List data.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "95385", refsource: "BID", url: "http://www.securityfocus.com/bid/95385", }, { name: "https://github.com/libimobiledevice/libplist/commit/3a55ddd3c4c11ce75a86afbefd085d8d397ff957", refsource: "CONFIRM", url: "https://github.com/libimobiledevice/libplist/commit/3a55ddd3c4c11ce75a86afbefd085d8d397ff957", }, { name: "[debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-5209", datePublished: "2017-01-11T16:00:00", dateReserved: "2017-01-09T00:00:00", dateUpdated: "2024-08-05T14:55:35.757Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-7982
Vulnerability from cvelistv5
Published
2017-04-20 14:00
Modified
2024-08-05 16:19
Severity ?
EPSS score ?
Summary
Integer overflow in the plist_from_bin function in bplist.c in libimobiledevice/libplist before 2017-04-19 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted plist file.
References
▼ | URL | Tags |
---|---|---|
https://github.com/libimobiledevice/libplist/issues/103 | x_refsource_CONFIRM | |
https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T16:19:29.515Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/libimobiledevice/libplist/issues/103", }, { name: "[debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-04-20T00:00:00", descriptions: [ { lang: "en", value: "Integer overflow in the plist_from_bin function in bplist.c in libimobiledevice/libplist before 2017-04-19 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted plist file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-04-02T09:06:07", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/libimobiledevice/libplist/issues/103", }, { name: "[debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-7982", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Integer overflow in the plist_from_bin function in bplist.c in libimobiledevice/libplist before 2017-04-19 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted plist file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/libimobiledevice/libplist/issues/103", refsource: "CONFIRM", url: "https://github.com/libimobiledevice/libplist/issues/103", }, { name: "[debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-7982", datePublished: "2017-04-20T14:00:00", dateReserved: "2017-04-20T00:00:00", dateUpdated: "2024-08-05T16:19:29.515Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-5835
Vulnerability from cvelistv5
Published
2017-03-03 15:00
Modified
2024-08-05 15:11
Severity ?
EPSS score ?
Summary
libplist allows attackers to cause a denial of service (large memory allocation and crash) via vectors involving an offset size of zero.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/96022 | vdb-entry, x_refsource_BID | |
https://github.com/libimobiledevice/libplist/issues/88 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2017/01/31/6 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2017/02/02/4 | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:11:48.899Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "96022", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/96022", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/libimobiledevice/libplist/issues/88", }, { name: "[oss-security] 20170131 CVE request: multiples vulnerabilities in libplist", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2017/01/31/6", }, { name: "[oss-security] 20170202 Re: CVE request: multiples vulnerabilities in libplist", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2017/02/02/4", }, { name: "[debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-01-17T00:00:00", descriptions: [ { lang: "en", value: "libplist allows attackers to cause a denial of service (large memory allocation and crash) via vectors involving an offset size of zero.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-04-02T09:06:07", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "96022", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/96022", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/libimobiledevice/libplist/issues/88", }, { name: "[oss-security] 20170131 CVE request: multiples vulnerabilities in libplist", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2017/01/31/6", }, { name: "[oss-security] 20170202 Re: CVE request: multiples vulnerabilities in libplist", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2017/02/02/4", }, { name: "[debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-5835", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "libplist allows attackers to cause a denial of service (large memory allocation and crash) via vectors involving an offset size of zero.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "96022", refsource: "BID", url: "http://www.securityfocus.com/bid/96022", }, { name: "https://github.com/libimobiledevice/libplist/issues/88", refsource: "CONFIRM", url: "https://github.com/libimobiledevice/libplist/issues/88", }, { name: "[oss-security] 20170131 CVE request: multiples vulnerabilities in libplist", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2017/01/31/6", }, { name: "[oss-security] 20170202 Re: CVE request: multiples vulnerabilities in libplist", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2017/02/02/4", }, { name: "[debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-5835", datePublished: "2017-03-03T15:00:00", dateReserved: "2017-02-01T00:00:00", dateUpdated: "2024-08-05T15:11:48.899Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-5545
Vulnerability from cvelistv5
Published
2017-01-21 01:00
Modified
2024-08-05 15:04
Severity ?
EPSS score ?
Summary
The main function in plistutil.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short.
References
▼ | URL | Tags |
---|---|---|
https://github.com/libimobiledevice/libplist/commit/7391a506352c009fe044dead7baad9e22dd279ee | x_refsource_CONFIRM | |
https://github.com/libimobiledevice/libplist/issues/87 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/95702 | vdb-entry, x_refsource_BID | |
https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:04:15.311Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/libimobiledevice/libplist/commit/7391a506352c009fe044dead7baad9e22dd279ee", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/libimobiledevice/libplist/issues/87", }, { name: "95702", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/95702", }, { name: "[debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-01-20T00:00:00", descriptions: [ { lang: "en", value: "The main function in plistutil.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-04-02T09:06:05", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/libimobiledevice/libplist/commit/7391a506352c009fe044dead7baad9e22dd279ee", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/libimobiledevice/libplist/issues/87", }, { name: "95702", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/95702", }, { name: "[debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-5545", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The main function in plistutil.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/libimobiledevice/libplist/commit/7391a506352c009fe044dead7baad9e22dd279ee", refsource: "CONFIRM", url: "https://github.com/libimobiledevice/libplist/commit/7391a506352c009fe044dead7baad9e22dd279ee", }, { name: "https://github.com/libimobiledevice/libplist/issues/87", refsource: "CONFIRM", url: "https://github.com/libimobiledevice/libplist/issues/87", }, { name: "95702", refsource: "BID", url: "http://www.securityfocus.com/bid/95702", }, { name: "[debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-5545", datePublished: "2017-01-21T01:00:00", dateReserved: "2017-01-20T00:00:00", dateUpdated: "2024-08-05T15:04:15.311Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-5836
Vulnerability from cvelistv5
Published
2017-03-03 15:00
Modified
2024-08-05 15:11
Severity ?
EPSS score ?
Summary
The plist_free_data function in plist.c in libplist allows attackers to cause a denial of service (crash) via vectors involving an integer node that is treated as a PLIST_KEY and then triggers an invalid free.
References
▼ | URL | Tags |
---|---|---|
https://github.com/libimobiledevice/libplist/issues/86 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/96022 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2017/01/31/6 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2017/02/02/4 | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T15:11:48.884Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/libimobiledevice/libplist/issues/86", }, { name: "96022", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/96022", }, { name: "[oss-security] 20170131 CVE request: multiples vulnerabilities in libplist", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2017/01/31/6", }, { name: "[oss-security] 20170202 Re: CVE request: multiples vulnerabilities in libplist", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2017/02/02/4", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-01-15T00:00:00", descriptions: [ { lang: "en", value: "The plist_free_data function in plist.c in libplist allows attackers to cause a denial of service (crash) via vectors involving an integer node that is treated as a PLIST_KEY and then triggers an invalid free.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-03-06T10:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/libimobiledevice/libplist/issues/86", }, { name: "96022", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/96022", }, { name: "[oss-security] 20170131 CVE request: multiples vulnerabilities in libplist", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2017/01/31/6", }, { name: "[oss-security] 20170202 Re: CVE request: multiples vulnerabilities in libplist", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2017/02/02/4", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-5836", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The plist_free_data function in plist.c in libplist allows attackers to cause a denial of service (crash) via vectors involving an integer node that is treated as a PLIST_KEY and then triggers an invalid free.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/libimobiledevice/libplist/issues/86", refsource: "CONFIRM", url: "https://github.com/libimobiledevice/libplist/issues/86", }, { name: "96022", refsource: "BID", url: "http://www.securityfocus.com/bid/96022", }, { name: "[oss-security] 20170131 CVE request: multiples vulnerabilities in libplist", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2017/01/31/6", }, { name: "[oss-security] 20170202 Re: CVE request: multiples vulnerabilities in libplist", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2017/02/02/4", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-5836", datePublished: "2017-03-03T15:00:00", dateReserved: "2017-02-01T00:00:00", dateUpdated: "2024-08-05T15:11:48.884Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2015-10082
Vulnerability from cvelistv5
Published
2023-02-21 07:00
Modified
2024-08-06 08:58
Severity ?
5.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.5 (Medium) - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.5 (Medium) - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS score ?
Summary
A vulnerability classified as problematic has been found in UIKit0 libplist 1.12. This affects the function plist_from_xml of the file src/xplist.c of the component XML Handler. The manipulation leads to xml external entity reference. The patch is named c086cb139af7c82845f6d565e636073ff4b37440. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221499.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.221499 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.221499 | signature, permissions-required | |
https://github.com/UIKit0/libplist/commit/c086cb139af7c82845f6d565e636073ff4b37440 | patch |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T08:58:26.353Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vdb-entry", "technical-description", "x_transferred", ], url: "https://vuldb.com/?id.221499", }, { tags: [ "signature", "permissions-required", "x_transferred", ], url: "https://vuldb.com/?ctiid.221499", }, { tags: [ "patch", "x_transferred", ], url: "https://github.com/UIKit0/libplist/commit/c086cb139af7c82845f6d565e636073ff4b37440", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { modules: [ "XML Handler", ], product: "libplist", vendor: "UIKit0", versions: [ { status: "affected", version: "1.12", }, ], }, ], credits: [ { lang: "en", type: "tool", value: "VulDB GitHub Commit Analyzer", }, ], descriptions: [ { lang: "en", value: "A vulnerability classified as problematic has been found in UIKit0 libplist 1.12. This affects the function plist_from_xml of the file src/xplist.c of the component XML Handler. The manipulation leads to xml external entity reference. The patch is named c086cb139af7c82845f6d565e636073ff4b37440. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221499.", }, { lang: "de", value: "Es wurde eine Schwachstelle in UIKit0 libplist 1.12 entdeckt. Sie wurde als problematisch eingestuft. Betroffen hiervon ist die Funktion plist_from_xml der Datei src/xplist.c der Komponente XML Handler. Durch die Manipulation mit unbekannten Daten kann eine xml external entity reference-Schwachstelle ausgenutzt werden. Der Patch wird als c086cb139af7c82845f6d565e636073ff4b37440 bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen.", }, ], metrics: [ { cvssV3_1: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, }, { cvssV3_0: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, }, { cvssV2_0: { baseScore: 5.2, vectorString: "AV:A/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-611", description: "CWE-611 XML External Entity Reference", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-20T08:58:52.317Z", orgId: "1af790b2-7ee1-4545-860a-a788eba489b5", shortName: "VulDB", }, references: [ { tags: [ "vdb-entry", "technical-description", ], url: "https://vuldb.com/?id.221499", }, { tags: [ "signature", "permissions-required", ], url: "https://vuldb.com/?ctiid.221499", }, { tags: [ "patch", ], url: "https://github.com/UIKit0/libplist/commit/c086cb139af7c82845f6d565e636073ff4b37440", }, ], timeline: [ { lang: "en", time: "2023-02-19T00:00:00.000Z", value: "Advisory disclosed", }, { lang: "en", time: "2023-02-19T00:00:00.000Z", value: "CVE reserved", }, { lang: "en", time: "2023-02-19T01:00:00.000Z", value: "VulDB entry created", }, { lang: "en", time: "2023-03-23T11:08:47.000Z", value: "VulDB entry last update", }, ], title: "UIKit0 libplist XML xplist.c plist_from_xml xml external entity reference", }, }, cveMetadata: { assignerOrgId: "1af790b2-7ee1-4545-860a-a788eba489b5", assignerShortName: "VulDB", cveId: "CVE-2015-10082", datePublished: "2023-02-21T07:00:05.828Z", dateReserved: "2023-02-19T15:52:05.564Z", dateUpdated: "2024-08-06T08:58:26.353Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2017-01-21 01:59
Modified
2024-11-21 03:27
Severity ?
Summary
The main function in plistutil.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/95702 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://github.com/libimobiledevice/libplist/commit/7391a506352c009fe044dead7baad9e22dd279ee | Issue Tracking, Patch, Third Party Advisory | |
cve@mitre.org | https://github.com/libimobiledevice/libplist/issues/87 | Issue Tracking, Patch, Third Party Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/95702 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/libimobiledevice/libplist/commit/7391a506352c009fe044dead7baad9e22dd279ee | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/libimobiledevice/libplist/issues/87 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libimobiledevice | libplist | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libimobiledevice:libplist:*:*:*:*:*:*:*:*", matchCriteriaId: "4201391B-6535-4AE4-87AD-4112C3F2B48A", versionEndIncluding: "1.12", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The main function in plistutil.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short.", }, { lang: "es", value: "La función principal en plistutil.c en libimobiledevice libplist hasta la versión 1.12 permite a atacantes obtener información sensible de la memoria de proceso o provocar una denegación de servicio (sobre lectura del búfer) a través de datos Apple Property List que son demasiado cortos.", }, ], id: "CVE-2017-5545", lastModified: "2024-11-21T03:27:51.660", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.4, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-01-21T01:59:00.170", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/95702", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/libimobiledevice/libplist/commit/7391a506352c009fe044dead7baad9e22dd279ee", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/libimobiledevice/libplist/issues/87", }, { source: "cve@mitre.org", url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/95702", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/libimobiledevice/libplist/commit/7391a506352c009fe044dead7baad9e22dd279ee", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/libimobiledevice/libplist/issues/87", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-04-20 14:59
Modified
2024-11-21 03:33
Severity ?
Summary
Integer overflow in the plist_from_bin function in bplist.c in libimobiledevice/libplist before 2017-04-19 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted plist file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libimobiledevice | libplist | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libimobiledevice:libplist:*:*:*:*:*:*:*:*", matchCriteriaId: "4201391B-6535-4AE4-87AD-4112C3F2B48A", versionEndIncluding: "1.12", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Integer overflow in the plist_from_bin function in bplist.c in libimobiledevice/libplist before 2017-04-19 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted plist file.", }, { lang: "es", value: "Desbordamiento de entero en la función plist_from_bin en bplist.c en libimobiledevice/libplist en versiones anteriores a 2017-04-19 permiten a atacantes remotos provocar una denegación de servicio (sobre lectura de buffer basado en memoria dinámica y caída de aplicación) a través de un archivo plist manipulado.", }, ], id: "CVE-2017-7982", lastModified: "2024-11-21T03:33:05.877", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-04-20T14:59:00.253", references: [ { source: "cve@mitre.org", tags: [ "VDB Entry", ], url: "https://github.com/libimobiledevice/libplist/issues/103", }, { source: "cve@mitre.org", url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "VDB Entry", ], url: "https://github.com/libimobiledevice/libplist/issues/103", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-190", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-03-03 15:59
Modified
2024-11-21 03:28
Severity ?
Summary
The parse_dict_node function in bplist.c in libplist allows attackers to cause a denial of service (out-of-bounds heap read and crash) via a crafted file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libimobiledevice | libplist | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libimobiledevice:libplist:*:*:*:*:*:*:*:*", matchCriteriaId: "70A2E6FE-8C00-4F39-953F-2E8ED3FBF332", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The parse_dict_node function in bplist.c in libplist allows attackers to cause a denial of service (out-of-bounds heap read and crash) via a crafted file.", }, { lang: "es", value: "La función parse_dict_node en bplist.c en libplist permite a atacantes provocar una denegación de servicio (lectura de memoria dinámica fuera de límites y caída) a través de un archivo manipulado.", }, ], id: "CVE-2017-5834", lastModified: "2024-11-21T03:28:28.797", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-03-03T15:59:01.197", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2017/01/31/6", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2017/02/02/4", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/96022", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/libimobiledevice/libplist/issues/89", }, { source: "cve@mitre.org", url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2017/01/31/6", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2017/02/02/4", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/96022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/libimobiledevice/libplist/issues/89", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-02-21 07:15
Modified
2024-11-21 02:24
Severity ?
5.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability classified as problematic has been found in UIKit0 libplist 1.12. This affects the function plist_from_xml of the file src/xplist.c of the component XML Handler. The manipulation leads to xml external entity reference. The patch is named c086cb139af7c82845f6d565e636073ff4b37440. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221499.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libimobiledevice | libplist | 1.12 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libimobiledevice:libplist:1.12:*:*:*:*:*:*:*", matchCriteriaId: "1CFE62B4-E9A8-4711-AF4E-86B3D048A648", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability classified as problematic has been found in UIKit0 libplist 1.12. This affects the function plist_from_xml of the file src/xplist.c of the component XML Handler. The manipulation leads to xml external entity reference. The patch is named c086cb139af7c82845f6d565e636073ff4b37440. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221499.", }, ], id: "CVE-2015-10082", lastModified: "2024-11-21T02:24:20.213", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 5.2, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:A/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 5.1, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "cna@vuldb.com", type: "Secondary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "LOW", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, exploitabilityScore: 2.1, impactScore: 3.4, source: "cna@vuldb.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-02-21T07:15:10.173", references: [ { source: "cna@vuldb.com", tags: [ "Patch", ], url: "https://github.com/UIKit0/libplist/commit/c086cb139af7c82845f6d565e636073ff4b37440", }, { source: "cna@vuldb.com", tags: [ "Permissions Required", ], url: "https://vuldb.com/?ctiid.221499", }, { source: "cna@vuldb.com", tags: [ "Permissions Required", ], url: "https://vuldb.com/?id.221499", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/UIKit0/libplist/commit/c086cb139af7c82845f6d565e636073ff4b37440", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", ], url: "https://vuldb.com/?ctiid.221499", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", ], url: "https://vuldb.com/?id.221499", }, ], sourceIdentifier: "cna@vuldb.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-611", }, ], source: "cna@vuldb.com", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-01-11 16:59
Modified
2024-11-21 03:27
Severity ?
Summary
The base64decode function in base64.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via split encoded Apple Property List data.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libimobiledevice | libplist | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libimobiledevice:libplist:*:*:*:*:*:*:*:*", matchCriteriaId: "4201391B-6535-4AE4-87AD-4112C3F2B48A", versionEndIncluding: "1.12", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The base64decode function in base64.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via split encoded Apple Property List data.", }, { lang: "es", value: "La función base64decode en base64.c en libimobiledevice libplist hasta la versión 1.12 permite a atacantes obtener información sensible de la memoria de proceso o provocar una denegación de servicio (sobrelectura del búfer) a través de datos split codificados Apple Property List.", }, ], id: "CVE-2017-5209", lastModified: "2024-11-21T03:27:17.073", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.4, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-01-11T16:59:00.377", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/95385", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "https://github.com/libimobiledevice/libplist/commit/3a55ddd3c4c11ce75a86afbefd085d8d397ff957", }, { source: "cve@mitre.org", url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/95385", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/libimobiledevice/libplist/commit/3a55ddd3c4c11ce75a86afbefd085d8d397ff957", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-03-03 15:59
Modified
2024-11-21 03:28
Severity ?
Summary
libplist allows attackers to cause a denial of service (large memory allocation and crash) via vectors involving an offset size of zero.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libimobiledevice | libplist | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libimobiledevice:libplist:*:*:*:*:*:*:*:*", matchCriteriaId: "70A2E6FE-8C00-4F39-953F-2E8ED3FBF332", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "libplist allows attackers to cause a denial of service (large memory allocation and crash) via vectors involving an offset size of zero.", }, { lang: "es", value: "libplist permite a atacantes provocar una denegación de servicio (gran asignación de memoria y caída) a través de vectores que involucran un tamaño de desplazamiento de cero.", }, ], id: "CVE-2017-5835", lastModified: "2024-11-21T03:28:28.963", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-03-03T15:59:01.243", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2017/01/31/6", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2017/02/02/4", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/96022", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/libimobiledevice/libplist/issues/88", }, { source: "cve@mitre.org", url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2017/01/31/6", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2017/02/02/4", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/96022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/libimobiledevice/libplist/issues/88", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-770", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-03-03 15:59
Modified
2024-11-21 03:28
Severity ?
Summary
The plist_free_data function in plist.c in libplist allows attackers to cause a denial of service (crash) via vectors involving an integer node that is treated as a PLIST_KEY and then triggers an invalid free.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.openwall.com/lists/oss-security/2017/01/31/6 | Mailing List, Patch, Third Party Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2017/02/02/4 | Mailing List, Patch, Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/96022 | ||
cve@mitre.org | https://github.com/libimobiledevice/libplist/issues/86 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2017/01/31/6 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2017/02/02/4 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/96022 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/libimobiledevice/libplist/issues/86 | Issue Tracking, Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libimobiledevice | libplist | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libimobiledevice:libplist:*:*:*:*:*:*:*:*", matchCriteriaId: "70A2E6FE-8C00-4F39-953F-2E8ED3FBF332", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The plist_free_data function in plist.c in libplist allows attackers to cause a denial of service (crash) via vectors involving an integer node that is treated as a PLIST_KEY and then triggers an invalid free.", }, { lang: "es", value: "La función plist_free_data en plist.c en libplist permite a atacantes provocar una denegación de servicio (caída) a través de vectores que involucran un nodo de entero que es tratado como una PLIST_KEY y desencadena entonces una liberación no válida.", }, ], id: "CVE-2017-5836", lastModified: "2024-11-21T03:28:29.130", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-03-03T15:59:01.273", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2017/01/31/6", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2017/02/02/4", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/96022", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/libimobiledevice/libplist/issues/86", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2017/01/31/6", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2017/02/02/4", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/96022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/libimobiledevice/libplist/issues/86", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-415", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }