{"affected":[{"ecosystem_specific":{"binaries":[{"libplist++3":"1.12-19.1","libplist3":"1.12-19.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP2","name":"libplist","purl":"pkg:rpm/suse/libplist&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.12-19.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libplist3":"1.12-19.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for Raspberry Pi 12 SP2","name":"libplist","purl":"pkg:rpm/suse/libplist&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.12-19.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libplist++-devel":"1.12-19.1","libplist-devel":"1.12-19.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP2","name":"libplist","purl":"pkg:rpm/suse/libplist&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.12-19.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libplist3":"1.12-19.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2","name":"libplist","purl":"pkg:rpm/suse/libplist&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.12-19.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libplist3":"1.12-19.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"libplist","purl":"pkg:rpm/suse/libplist&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.12-19.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libplist++3":"1.12-19.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Workstation Extension 12 SP2","name":"libplist","purl":"pkg:rpm/suse/libplist&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.12-19.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for libplist fixes the following issues:\n \n- CVE-2017-5209: The base64decode function in libplist allowed attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via split encoded Apple Property List data (bsc#1019531).\n- CVE-2017-5545: The main function in plistutil.c in libimobiledevice libplist allowed attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short. (bsc#1021610).\n- CVE-2017-5836: A type inconsistency in bplist.c was fixed. (bsc#1023807)\n- CVE-2017-5835: A memory allocation error leading to DoS was fixed. (bsc#1023822)\n- CVE-2017-5834: A heap-buffer overflow in parse_dict_node was fixed. (bsc#1023848)\n- CVE-2017-6440: Ensure that sanity checks work on 32-bit platforms.  (bsc#1029631)\n- CVE-2017-7982: Add some safety checks, backported from upstream (bsc#1035312). \n- CVE-2017-5836: A maliciously crafted file could cause the application to crash. (bsc#1023807).\n- CVE-2017-5835: Malicious crafted file could cause libplist to allocate large amounts of memory \nand consume lots of CPU (bsc#1023822) \n- CVE-2017-5834: Maliciou crafted file could cause a heap buffer overflow or segmentation fault (bsc#1023848)\n\n ","id":"SUSE-SU-2017:1379-1","modified":"2017-05-23T13:38:46Z","published":"2017-05-23T13:38:46Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2017/suse-su-20171379-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1019531"},{"type":"REPORT","url":"https://bugzilla.suse.com/1021610"},{"type":"REPORT","url":"https://bugzilla.suse.com/1023807"},{"type":"REPORT","url":"https://bugzilla.suse.com/1023822"},{"type":"REPORT","url":"https://bugzilla.suse.com/1023848"},{"type":"REPORT","url":"https://bugzilla.suse.com/1029631"},{"type":"REPORT","url":"https://bugzilla.suse.com/1035312"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5209"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5545"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5834"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5835"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-5836"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-6440"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-7982"}],"related":["CVE-2017-5209","CVE-2017-5545","CVE-2017-5834","CVE-2017-5835","CVE-2017-5836","CVE-2017-6440","CVE-2017-7982"],"summary":"Security update for libplist","upstream":["CVE-2017-5209","CVE-2017-5545","CVE-2017-5834","CVE-2017-5835","CVE-2017-5836","CVE-2017-6440","CVE-2017-7982"]}