Heap-based buffer overflow in the cdf_read_sat function in src/cdf.c in Christos Zoulas file 5.00 allows user-assisted remote attackers to execute arbitrary code via a crafted compound document file, as demonstrated by a .msi, .doc, or .mpp file. NOTE: some of these details are obtained from third party information.
References
Configurations
History
21 Nov 2024, 01:02
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.astron.com/pub/file/file-5.01.tar.gz - | |
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=515603 - | |
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=525820 - | |
References | () http://mx.gw.com/pipermail/file/2009/000379.html - | |
References | () http://secunia.com/advisories/34881 - Vendor Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:129 - | |
References | () http://www.osvdb.org/54100 - | |
References | () http://www.securityfocus.com/bid/34745 - Exploit |
Information
Published : 2009-05-04 16:30
Updated : 2024-11-21 01:02
NVD link : CVE-2009-1515
Mitre link : CVE-2009-1515
CVE.ORG link : CVE-2009-1515
JSON object : View
Products Affected
christos_zoulas
- file
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer