[Security-team] [Fwd: [SA20921] libwmf Integer Overflow Vulnerability]
Alexey Borovskoy
=?iso-8859-1?q?alexey=2Eborovskoy_=CE=C1_gmail=2Ecom?=
Сб Июл 8 11:28:33 MSD 2006
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
TITLE:
libwmf Integer Overflow Vulnerability
SECUNIA ADVISORY ID:
SA20921
VERIFY ADVISORY:
http://secunia.com/advisories/20921/
CRITICAL:
Highly critical
IMPACT:
DoS, System access
WHERE:
>From remote
SOFTWARE:
libwmf 0.x
http://secunia.com/product/10794/
DESCRIPTION:
infamous41md has reported a vulnerability in libwmf, which
potentially can be exploited by malicious people to compromise an
application using the vulnerable library.
The vulnerability is caused due to an integer overflow error when
allocating memory based on a value taken directly from a WMF file
without performing any checks. This can be exploited to cause a
heap-based buffer overflow when a specially crafted WMF file is
processed.
Successful exploitation may allow execution of arbitrary code.
The vulnerability has been reported in version 0.2.8.4. Other
versions may also be affected.
SOLUTION:
Do not open untrusted WMF files in applications using the vulnerable
library.
PROVIDED AND/OR DISCOVERED BY:
infamous41md
- --
Алексей.
GPG key fingerprint
949B BC0E 2C44 7528 4F63 2753 E37A 9E3F 11F3 BDE1
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFEr16f43qePxHzveERAnn0AJ9ai+Byo9vYM00ErO+wwAtO+zdHygCgsRLH
bxZci9CKNqQfGctw/Awhujo=
=gBcd
-----END PGP SIGNATURE-----
Подробная информация о списке рассылки Security-team