-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.0818
                       Debian exempi security update
                               22 March 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           exempi
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Denial of Service        -- Remote with User Interaction
                   Access Confidential Data -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-7730 CVE-2018-7728 CVE-2017-18238
                   CVE-2017-18236 CVE-2017-18234 CVE-2017-18233

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2018/03/msg00013.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running exempi check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : exempi
Version        : 2.2.0-1+deb7u1
CVE ID         : CVE-2017-18233 CVE-2017-18234 CVE-2017-18236
                 CVE-2017-18238 CVE-2018-7728 CVE-2018-7730

Various issues were discovered in exempi, a library to parse XMP
metadata that may cause a denial-of-service or may have other
unspecified impact via crafted files.


CVE-2017-18233
    An Integer overflow in the Chunk class in RIFF.cpp allows remote
    attackers to cause a denial of service (infinite loop) via crafted
    XMP data in an .avi file.

CVE-2017-18234
    An issue was discovered that allows remote attackers to cause a
    denial of service (invalid memcpy with resultant use-after-free)
    or possibly have unspecified other impact via a .pdf file containing
    JPEG data.

CVE-2017-18236
    The ASF_Support::ReadHeaderObject function in ASF_Support.cpp allows
    remote attackers to cause a denial of service (infinite loop) via a
    crafted .asf file.

CVE-2017-18238
    The TradQT_Manager::ParseCachedBoxes function in
    QuickTime_Support.cpp allows remote attackers to cause
    a denial of service (infinite loop) via crafted XMP data in
    a .qt file.

CVE-2018-7728
   TIFF_Handler.cpp mishandles a case of a zero length, leading to a
   heap-based buffer over-read in the MD5Update() function in
   MD5.cpp.

CVE-2018-7730
    A certain case of a 0xffffffff length is mishandled in
    PSIR_FileWriter.cpp, leading to a heap-based buffer over-read
    in the PSD_MetaHandler::CacheFileData() function.

For Debian 7 "Wheezy", these problems have been fixed in version
2.2.0-1+deb7u1.

We recommend that you upgrade your exempi packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=DW/l
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=7z6x
-----END PGP SIGNATURE-----