Vulnerabilities > CVE-2018-11439 - Out-of-bounds Read vulnerability in multiple products

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
taglib
debian
CWE-125
nessus

Summary

The TagLib::Ogg::FLAC::File::scan function in oggflacfile.cpp in TagLib 1.11.1 allows remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted audio file.

Vulnerable Configurations

Part Description Count
Application
Taglib
1
OS
Debian
2

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Overread Buffers
    An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.

Nessus

  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2482.NASL
    descriptionAccording to the versions of the taglib package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - The TagLib::Ogg::FLAC::File::scan function in oggflacfile.cpp in TagLib 1.11.1 allows remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted audio file.(CVE-2018-11439) - In TagLib 1.11.1, the rebuildAggregateFrames function in id3v2framefactory.cpp has a pointer to cast vulnerability, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted audio file.(CVE-2017-12678) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-08
    modified2019-12-04
    plugin id131635
    published2019-12-04
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131635
    titleEulerOS 2.0 SP2 : taglib (EulerOS-SA-2019-2482)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(131635);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/07");
    
      script_cve_id(
        "CVE-2017-12678",
        "CVE-2018-11439"
      );
    
      script_name(english:"EulerOS 2.0 SP2 : taglib (EulerOS-SA-2019-2482)");
      script_summary(english:"Checks the rpm output for the updated packages.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote EulerOS host is missing multiple security updates.");
      script_set_attribute(attribute:"description", value:
    "According to the versions of the taglib package installed, the
    EulerOS installation on the remote host is affected by the following
    vulnerabilities :
    
      - The TagLib::Ogg::FLAC::File::scan function in
        oggflacfile.cpp in TagLib 1.11.1 allows remote
        attackers to cause information disclosure (heap-based
        buffer over-read) via a crafted audio
        file.(CVE-2018-11439)
    
      - In TagLib 1.11.1, the rebuildAggregateFrames function
        in id3v2framefactory.cpp has a pointer to cast
        vulnerability, which allows remote attackers to cause a
        denial of service or possibly have unspecified other
        impact via a crafted audio file.(CVE-2017-12678)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the EulerOS security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues.");
      # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2482
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c2d21c98");
      script_set_attribute(attribute:"solution", value:
    "Update the affected taglib packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2019/12/04");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/12/04");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:taglib");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Huawei Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
      script_exclude_keys("Host/EulerOS/uvp_version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/EulerOS/release");
    if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
    if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0");
    
    sp = get_kb_item("Host/EulerOS/sp");
    if (isnull(sp) || sp !~ "^(2)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP2");
    
    uvp = get_kb_item("Host/EulerOS/uvp_version");
    if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP2", "EulerOS UVP " + uvp);
    
    if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
    
    flag = 0;
    
    pkgs = ["taglib-1.11.1-5.h1"];
    
    foreach (pkg in pkgs)
      if (rpm_check(release:"EulerOS-2.0", sp:"2", reference:pkg)) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "taglib");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-1175.NASL
    descriptionThe remote Redhat Enterprise Linux 7 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:1175 advisory. - taglib: heap-based buffer over-read via a crafted audio file (CVE-2018-11439) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-04-23
    modified2020-03-31
    plugin id135037
    published2020-03-31
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135037
    titleRHEL 7 : taglib (RHSA-2020:1175)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1662.NASL
    descriptionAccording to the version of the taglib package installed, the EulerOS installation on the remote host is affected by the following vulnerability : - The TagLib::Ogg::FLAC::File::scan function in oggflacfile.cpp in TagLib 1.11.1 allows remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted audio file.(CVE-2018-11439) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-03
    modified2019-06-27
    plugin id126289
    published2019-06-27
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126289
    titleEulerOS 2.0 SP8 : taglib (EulerOS-SA-2019-1662)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_D3F3E8188D1011EA8668E0D55E2A8BF9.NASL
    descriptionWebin security lab - dbapp security Ltd reports : The TagLib::Ogg::FLAC::File::scan function in oggflacfile.cpp in TagLib 1.11.1 allows remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted audio file.
    last seen2020-05-08
    modified2020-05-04
    plugin id136303
    published2020-05-04
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136303
    titleFreeBSD : taglib -- heap-based buffer over-read via a crafted audio file (d3f3e818-8d10-11ea-8668-e0d55e2a8bf9)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2020-1175.NASL
    descriptionThe remote Redhat Enterprise Linux 7 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:1175 advisory. - taglib: heap-based buffer over-read via a crafted audio file (CVE-2018-11439) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-06
    modified2020-04-10
    plugin id135351
    published2020-04-10
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135351
    titleCentOS 7 : taglib (CESA-2020:1175)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2672.NASL
    descriptionAccording to the version of the taglib package installed, the EulerOS installation on the remote host is affected by the following vulnerability : - The TagLib::Ogg::FLAC::File::scan function in oggflacfile.cpp in TagLib 1.11.1 allows remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted audio file.(CVE-2018-11439) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-08
    modified2019-12-18
    plugin id132207
    published2019-12-18
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/132207
    titleEulerOS 2.0 SP3 : taglib (EulerOS-SA-2019-2672)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2018-627.NASL
    descriptionThis update for taglib fixes this security issues : - CVE-2018-11439: The TagLib::Ogg::FLAC::File::scan function allowed remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted audio file (bsc#1096180).
    last seen2020-06-05
    modified2018-06-14
    plugin id110529
    published2018-06-14
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/110529
    titleopenSUSE Security Update : taglib (openSUSE-2018-627)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20200407_TAGLIB_ON_SL7_X.NASL
    description* taglib: heap-based buffer over-read via a crafted audio file
    last seen2020-04-30
    modified2020-04-21
    plugin id135838
    published2020-04-21
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135838
    titleScientific Linux Security Update : taglib on SL7.x x86_64 (20200407)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-1374-2.NASL
    descriptionThis update for taglib fixes the following issues : CVE-2018-11439: The TagLib::Ogg::FLAC::File::scan function allowed remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted audio file (bsc#1096180) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id126459
    published2019-07-03
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126459
    titleSUSE SLED15 / SLES15 Security Update : taglib (SUSE-SU-2019:1374-2)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-1430.NASL
    descriptionCVE-2018-11439 Fix for a heap-based buffer over-read via a crafted audio file. For Debian 8
    last seen2020-06-01
    modified2020-06-02
    plugin id111167
    published2018-07-20
    reporterThis script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111167
    titleDebian DLA-1430-1 : taglib security update
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-432.NASL
    descriptionThis update for taglib fixes this security issues : - CVE-2018-11439: The TagLib::Ogg::FLAC::File::scan function allowed remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted audio file (bsc#1096180).
    last seen2020-05-31
    modified2019-03-27
    plugin id123189
    published2019-03-27
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123189
    titleopenSUSE Security Update : taglib (openSUSE-2019-432)

Redhat

advisories
bugzilla
id1584868
titleCVE-2018-11439 taglib: heap-based buffer over-read via a crafted audio file
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 7 is installed
      ovaloval:com.redhat.rhba:tst:20150364027
    • OR
      • AND
        • commenttaglib is earlier than 0:1.8-8.20130218git.el7
          ovaloval:com.redhat.rhsa:tst:20201175001
        • commenttaglib is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20201175002
      • AND
        • commenttaglib-doc is earlier than 0:1.8-8.20130218git.el7
          ovaloval:com.redhat.rhsa:tst:20201175003
        • commenttaglib-doc is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20201175004
      • AND
        • commenttaglib-devel is earlier than 0:1.8-8.20130218git.el7
          ovaloval:com.redhat.rhsa:tst:20201175005
        • commenttaglib-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20201175006
rhsa
idRHSA-2020:1175
released2020-03-31
severityLow
titleRHSA-2020:1175: taglib security update (Low)
rpms
  • taglib-0:1.8-8.20130218git.el7
  • taglib-debuginfo-0:1.8-8.20130218git.el7
  • taglib-devel-0:1.8-8.20130218git.el7
  • taglib-doc-0:1.8-8.20130218git.el7