From 02b5496c829add1b5a0dba102c1bce7f7443efae Mon Sep 17 00:00:00 2001 From: miwi Date: Sat, 16 May 2009 19:59:44 +0000 Subject: - Document libwmf -- Integer Overflow Vulnerability PR: based on 134246 --- security/vuxml/vuln.xml | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) (limited to 'security/vuxml') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index b032af90e745..5196759854de 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,40 @@ Note: Please add new entries to the beginning of this file. --> + + libwmf -- integer overflow vulnerability + + + libwmf + 0.2.8.4_3 + + + + +

secunia reports:

+
+

infamous41md has reported a vulnerability in libwmf, which + potentially can be exploited by malicious people to compromise an + application using the vulnerable library.

+

The vulnerability is caused due to an integer overflow error when + allocating memory based on a value taken directly from a WMF file + without performing any checks. This can be exploited to cause a + heap-based buffer overflow when a specially crafted WMF file is + processed.

+
+ +
+ + 18751 + CVE-2006-3376 + http://secunia.com/advisories/20921/ + + + 2006-07-03 + 2009-05-16 + +
+ moinmoin -- cross-site scripting vulnerabilities -- cgit