|
Message-Id: <1247915349.3704.7.camel@dhcp-lab164.englab.brq.redhat.com> Date: Sat, 18 Jul 2009 13:09:09 +0200 From: Jan Lieskovsky <jlieskov@...hat.com> To: "Steven M. Christey" <coley@...us.mitre.org> Cc: oss-security@...ts.openwall.com Subject: CVE Request -- HTMLDOC Hello Steve, vendors, a stack-based buffer overflow by processing user-supplied input was found (by ANTHRAX666) in HTMLDOC's routine, used to set the result page output size for custom page sizes. References: ----------- http://secunia.com/advisories/35780/2/ (Secunia advisory) http://packetstormsecurity.org/0907-exploits/htmldoc-overflow.txt (original proof of concept) http://bugs.gentoo.org/show_bug.cgi?id=278186 (Gentoo's BTS entry) Affected versions: Vulnerability confirmed in htmldoc-1.8.27 ----------------- (other versions may be also affected). Could you please allocate a new CVE identifier for it? Thanks && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.