oss-sec mailing list archives

Re: CVE Request -- HTMLDOC


From: "Steven M. Christey" <coley () linus mitre org>
Date: Wed, 2 Sep 2009 12:36:27 -0400 (EDT)



======================================================
Name: CVE-2009-3050
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3050
Reference: MLIST:[oss-security] 20090725 Re: CVE Request -- HTMLDOC
Reference: URL:http://www.openwall.com/lists/oss-security/2009/07/25/3
Reference: MLIST:[oss-security] 20090726 Re: CVE Request -- HTMLDOC
Reference: URL:http://www.openwall.com/lists/oss-security/2009/07/26/2
Reference: MLIST:[oss-security] 20090901 Re: CVE Request -- HTMLDOC
Reference: URL:http://www.openwall.com/lists/oss-security/2009/09/01/1
Reference: MISC:http://packetstormsecurity.org/0907-exploits/htmldoc-overflow.txt
Reference: CONFIRM:http://bugs.gentoo.org/show_bug.cgi?id=278186
Reference: CONFIRM:http://www.htmldoc.org/str.php?L214
Reference: SECUNIA:35780
Reference: URL:http://secunia.com/advisories/35780

Buffer overflow in the set_page_size function in util.cxx in HTMLDOC
1.8.27 and earlier allows context-dependent attackers to execute
arbitrary code via a long MEDIA SIZE comment.  NOTE: it was later
reported that there were additional vectors in htmllib.cxx and
ps-pdf.cxx using an AFM font file with a long glyph name, but these
vectors do not cross privilege boundaries.



Current thread: