oss-sec mailing list archives
Re: CVE Request -- HTMLDOC
From: "Steven M. Christey" <coley () linus mitre org>
Date: Wed, 2 Sep 2009 12:36:27 -0400 (EDT)
====================================================== Name: CVE-2009-3050 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3050 Reference: MLIST:[oss-security] 20090725 Re: CVE Request -- HTMLDOC Reference: URL:http://www.openwall.com/lists/oss-security/2009/07/25/3 Reference: MLIST:[oss-security] 20090726 Re: CVE Request -- HTMLDOC Reference: URL:http://www.openwall.com/lists/oss-security/2009/07/26/2 Reference: MLIST:[oss-security] 20090901 Re: CVE Request -- HTMLDOC Reference: URL:http://www.openwall.com/lists/oss-security/2009/09/01/1 Reference: MISC:http://packetstormsecurity.org/0907-exploits/htmldoc-overflow.txt Reference: CONFIRM:http://bugs.gentoo.org/show_bug.cgi?id=278186 Reference: CONFIRM:http://www.htmldoc.org/str.php?L214 Reference: SECUNIA:35780 Reference: URL:http://secunia.com/advisories/35780 Buffer overflow in the set_page_size function in util.cxx in HTMLDOC 1.8.27 and earlier allows context-dependent attackers to execute arbitrary code via a long MEDIA SIZE comment. NOTE: it was later reported that there were additional vectors in htmllib.cxx and ps-pdf.cxx using an AFM font file with a long glyph name, but these vectors do not cross privilege boundaries.
Current thread:
- CVE Request -- HTMLDOC Jan Lieskovsky (Jul 18)
- Re: CVE Request -- HTMLDOC Nico Golde (Jul 25)
- Re: CVE Request -- HTMLDOC Alex Legler (Jul 26)
- Re: CVE Request -- HTMLDOC Alex Legler (Sep 01)
- Re: CVE Request -- HTMLDOC Steven M. Christey (Sep 02)
- Re: CVE Request -- HTMLDOC Nico Golde (Jul 25)