oss-sec mailing list archives

Re: CVE request: file security issue


From: "Steven M. Christey" <coley () linus mitre org>
Date: Wed, 6 May 2009 11:42:09 -0400 (EDT)


======================================================
Name: CVE-2009-1515
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1515
Reference: MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=515603
Reference: MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=525820
Reference: CONFIRM:ftp://ftp.astron.com/pub/file/file-5.01.tar.gz
Reference: BID:34745
Reference: URL:http://www.securityfocus.com/bid/34745
Reference: OSVDB:54100
Reference: URL:http://www.osvdb.org/54100
Reference: SECUNIA:34881
Reference: URL:http://secunia.com/advisories/34881

Heap-based buffer overflow in the cdf_read_sat function in src/cdf.c
in Christos Zoulas file 5.00 allows user-assisted remote attackers to
execute arbitrary code via a crafted compound document file, as
demonstrated by a .msi, .doc, or .mpp file.  NOTE: some of these
details are obtained from third party information.



Current thread: