CVE-2005-2930

Stack-based buffer overflow in the _chm_find_in_PMGL function in chm_lib.c for chmlib before 0.36, as used in products such as KchmViewer, allows user-assisted attackers to execute arbitrary code via a CHM file containing a long element, a different vulnerability than CVE-2005-3318.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jed_wing:chm_lib:0.1:*:*:*:*:*:*:*
cpe:2.3:a:jed_wing:chm_lib:0.2:*:*:*:*:*:*:*
cpe:2.3:a:jed_wing:chm_lib:0.3:*:*:*:*:*:*:*
cpe:2.3:a:jed_wing:chm_lib:0.31:*:*:*:*:*:*:*
cpe:2.3:a:jed_wing:chm_lib:0.32:*:*:*:*:*:*:*
cpe:2.3:a:jed_wing:chm_lib:0.33:*:*:*:*:*:*:*
cpe:2.3:a:jed_wing:chm_lib:0.35:*:*:*:*:*:*:*

History

21 Nov 2024, 00:00

Type Values Removed Values Added
References () http://secunia.com/advisories/17775 - Patch, Vendor Advisory () http://secunia.com/advisories/17775 - Patch, Vendor Advisory
References () http://securityreason.com/securityalert/125 - () http://securityreason.com/securityalert/125 -
References () http://securitytracker.com/id?1015120 - Patch, Vendor Advisory () http://securitytracker.com/id?1015120 - Patch, Vendor Advisory
References () http://www.idefense.com/application/poi/display?id=332&type=vulnerabilities - Patch, Vendor Advisory () http://www.idefense.com/application/poi/display?id=332&type=vulnerabilities - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/15234 - Patch () http://www.securityfocus.com/bid/15234 - Patch
References () http://www.vupen.com/english/advisories/2005/2249 - Vendor Advisory () http://www.vupen.com/english/advisories/2005/2249 - Vendor Advisory

Information

Published : 2005-10-28 21:02

Updated : 2024-11-21 00:00


NVD link : CVE-2005-2930

Mitre link : CVE-2005-2930

CVE.ORG link : CVE-2005-2930


JSON object : View

Products Affected

jed_wing

  • chm_lib
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer