[Security-team] [Fwd: [SA20921] libwmf Integer Overflow Vulnerability]

Alexey Borovskoy =?iso-8859-1?q?alexey=2Eborovskoy_=CE=C1_gmail=2Ecom?=
Сб Июл 8 11:28:33 MSD 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

TITLE:
libwmf Integer Overflow Vulnerability

SECUNIA ADVISORY ID:
SA20921

VERIFY ADVISORY:
http://secunia.com/advisories/20921/

CRITICAL:
Highly critical

IMPACT:
DoS, System access

WHERE:
>From remote

SOFTWARE:
libwmf 0.x
http://secunia.com/product/10794/

DESCRIPTION:
infamous41md has reported a vulnerability in libwmf, which
potentially can be exploited by malicious people to compromise an
application using the vulnerable library.

The vulnerability is caused due to an integer overflow error when
allocating memory based on a value taken directly from a WMF file
without performing any checks. This can be exploited to cause a
heap-based buffer overflow when a specially crafted WMF file is
processed.

Successful exploitation may allow execution of arbitrary code.

The vulnerability has been reported in version 0.2.8.4. Other
versions may also be affected.

SOLUTION:
Do not open untrusted WMF files in applications using the vulnerable
library.

PROVIDED AND/OR DISCOVERED BY:
infamous41md

- --
Алексей.
GPG key fingerprint
949B BC0E 2C44 7528 4F63  2753 E37A 9E3F 11F3 BDE1
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEr16f43qePxHzveERAnn0AJ9ai+Byo9vYM00ErO+wwAtO+zdHygCgsRLH
bxZci9CKNqQfGctw/Awhujo=
=gBcd
-----END PGP SIGNATURE-----




Подробная информация о списке рассылки Security-team