Debian Security Advisory
DLA-1098-1 freexl -- LTS security update
- Date Reported:
- 17 Sep 2017
- Affected Packages:
- freexl
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2017-2923, CVE-2017-2924.
- More information:
-
The Cisco Talos team reported two sensitive security issues affecting FreeXL-1.0.3 and any previous version.
- CVE-2017-2923
An exploitable heap based buffer overflow vulnerability exists in the read_biff_next_record function of FreeXL 1.0.3. A specially crafted XLS file can cause a memory corruption resulting in remote code execution. An attacker can send malicious XLS file to trigger this vulnerability.
- CVE-2017-2924
An exploitable heap-based buffer overflow vulnerability exists in the read_legacy_biff function of FreeXL 1.0.3. A specially crafted XLS file can cause a memory corruption resulting in remote code execution. An attacker can send malicious XLS file to trigger this vulnerability.
For Debian 7
Wheezy
, these problems have been fixed in version 1.0.0b-1+deb7u4.We recommend that you upgrade your freexl packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2017-2923