|
Message-ID: <Pine.GSO.4.51.0909021236110.5392@faron.mitre.org> Date: Wed, 2 Sep 2009 12:36:27 -0400 (EDT) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security@...ts.openwall.com cc: "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: CVE Request -- HTMLDOC ====================================================== Name: CVE-2009-3050 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3050 Reference: MLIST:[oss-security] 20090725 Re: CVE Request -- HTMLDOC Reference: URL:http://www.openwall.com/lists/oss-security/2009/07/25/3 Reference: MLIST:[oss-security] 20090726 Re: CVE Request -- HTMLDOC Reference: URL:http://www.openwall.com/lists/oss-security/2009/07/26/2 Reference: MLIST:[oss-security] 20090901 Re: CVE Request -- HTMLDOC Reference: URL:http://www.openwall.com/lists/oss-security/2009/09/01/1 Reference: MISC:http://packetstormsecurity.org/0907-exploits/htmldoc-overflow.txt Reference: CONFIRM:http://bugs.gentoo.org/show_bug.cgi?id=278186 Reference: CONFIRM:http://www.htmldoc.org/str.php?L214 Reference: SECUNIA:35780 Reference: URL:http://secunia.com/advisories/35780 Buffer overflow in the set_page_size function in util.cxx in HTMLDOC 1.8.27 and earlier allows context-dependent attackers to execute arbitrary code via a long MEDIA SIZE comment. NOTE: it was later reported that there were additional vectors in htmllib.cxx and ps-pdf.cxx using an AFM font file with a long glyph name, but these vectors do not cross privilege boundaries.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.