CVE-2009-3050

Buffer overflow in the set_page_size function in util.cxx in HTMLDOC 1.8.27 and earlier allows context-dependent attackers to execute arbitrary code via a long MEDIA SIZE comment. NOTE: it was later reported that there were additional vectors in htmllib.cxx and ps-pdf.cxx using an AFM font file with a long glyph name, but these vectors do not cross privilege boundaries.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:htmldoc:htmldoc:*:*:*:*:*:*:*:*
cpe:2.3:a:htmldoc:htmldoc:1.8.24:*:*:*:*:*:*:*
cpe:2.3:a:htmldoc:htmldoc:1.8.25:*:*:*:*:*:*:*
cpe:2.3:a:htmldoc:htmldoc:1.8.26:*:*:*:*:*:*:*

History

21 Nov 2024, 01:06

Type Values Removed Values Added
References () http://bugs.gentoo.org/show_bug.cgi?id=278186 - Exploit () http://bugs.gentoo.org/show_bug.cgi?id=278186 - Exploit
References () http://packetstormsecurity.org/0907-exploits/htmldoc-overflow.txt - Exploit () http://packetstormsecurity.org/0907-exploits/htmldoc-overflow.txt - Exploit
References () http://secunia.com/advisories/35780 - Vendor Advisory () http://secunia.com/advisories/35780 - Vendor Advisory
References () http://www.htmldoc.org/str.php?L214 - Exploit () http://www.htmldoc.org/str.php?L214 - Exploit
References () http://www.openwall.com/lists/oss-security/2009/07/25/3 - () http://www.openwall.com/lists/oss-security/2009/07/25/3 -
References () http://www.openwall.com/lists/oss-security/2009/07/26/2 - () http://www.openwall.com/lists/oss-security/2009/07/26/2 -
References () http://www.openwall.com/lists/oss-security/2009/09/01/1 - () http://www.openwall.com/lists/oss-security/2009/09/01/1 -

Information

Published : 2009-09-02 17:30

Updated : 2024-11-21 01:06


NVD link : CVE-2009-3050

Mitre link : CVE-2009-3050

CVE.ORG link : CVE-2009-3050


JSON object : View

Products Affected

htmldoc

  • htmldoc
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer