Vulnerability Description
In GNU Libextractor 1.4, there is an integer signedness error for the chunk size in the EXTRACTOR_nsfe_extract_method function in plugins/nsfe_extractor.c, leading to an infinite loop for a crafted size.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Libextractor | 1.4 |
Related Weaknesses (CWE)
References
- http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00005.htmlExploitMailing ListThird Party Advisory
- https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gzProduct
- https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
- http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00005.htmlExploitMailing ListThird Party Advisory
- https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gzProduct
- https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html
FAQ
What is CVE-2017-15602?
CVE-2017-15602 is a vulnerability with a CVSS score of 7.5 (HIGH). In GNU Libextractor 1.4, there is an integer signedness error for the chunk size in the EXTRACTOR_nsfe_extract_method function in plugins/nsfe_extractor.c, leading to an infinite loop for a crafted si...
How severe is CVE-2017-15602?
CVE-2017-15602 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-15602?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Libextractor.