Buffer overflow in the set_page_size function in util.cxx in HTMLDOC 1.8.27 and earlier allows context-dependent attackers to execute arbitrary code via a long MEDIA SIZE comment. NOTE: it was later reported that there were additional vectors in htmllib.cxx and ps-pdf.cxx using an AFM font file with a long glyph name, but these vectors do not cross privilege boundaries.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.gentoo.org/show_bug.cgi?id=278186 - Exploit | |
References | () http://packetstormsecurity.org/0907-exploits/htmldoc-overflow.txt - Exploit | |
References | () http://secunia.com/advisories/35780 - Vendor Advisory | |
References | () http://www.htmldoc.org/str.php?L214 - Exploit | |
References | () http://www.openwall.com/lists/oss-security/2009/07/25/3 - | |
References | () http://www.openwall.com/lists/oss-security/2009/07/26/2 - | |
References | () http://www.openwall.com/lists/oss-security/2009/09/01/1 - |
Information
Published : 2009-09-02 17:30
Updated : 2024-11-21 01:06
NVD link : CVE-2009-3050
Mitre link : CVE-2009-3050
CVE.ORG link : CVE-2009-3050
JSON object : View
Products Affected
htmldoc
- htmldoc
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer