SB2018021528 - Stack-based buffer overflow in uwsgi (Alpine package)
Published: February 15, 2018
Security Bulletin ID
SB2018021528
Severity
Medium
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Stack-based buffer overflow (CVE-ID: CVE-2018-6758)
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in the uwsgi_expand_path function due to stack-based buffer overflow. A remote attacker can request a specially crafted long directory path, trigger memory corruption and cause the service to crash.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=5e2af39afbcd6a7530560bf24e9338705953b844
- https://git.alpinelinux.org/aports/commit/?id=3ee2dbe9737e86f9432a72e9cf49f41de7e5804b
- https://git.alpinelinux.org/aports/commit/?id=425c7d88629df3de36f29e358ce0ca27262664dd
- https://git.alpinelinux.org/aports/commit/?id=70b37ac2d8579e4bb8c86a3e95945788262b9e5d
- https://git.alpinelinux.org/aports/commit/?id=1308713a57c313602159ec24e457dc05f4865c60
- https://git.alpinelinux.org/aports/commit/?id=2dc988afe817d030718ef338ffccbf81b28f4634
- https://git.alpinelinux.org/aports/commit/?id=f659a6a6159868a0a4eba669963f24bb9dc8f8d8