Buffer overflow in the SVG importer (style.cpp) of inkscape 0.41 through 0.42.2 might allow remote attackers to execute arbitrary code via a SVG file with long CSS style property values.
Link | Tags |
---|---|
http://www.gentoo.org/security/en/glsa/glsa-200511-22.xml | vendor advisory |
http://www.novell.com/linux/security/advisories/2005_28_sr.html | vendor advisory |
http://secunia.com/advisories/17778 | third party advisory |
http://secunia.com/advisories/17651 | third party advisory vendor advisory |
http://www.ubuntulinux.org/usn/usn-217-1 | vendor advisory |
http://www.securityfocus.com/bid/15507 | exploit vdb entry patch |
http://secunia.com/advisories/17882 | third party advisory |
http://cvs.sourceforge.net/viewcvs.py/inkscape/inkscape/src/style.cpp?r1=1.110&r2=1.110.2.1 | |
http://www.vupen.com/english/advisories/2005/2511 | vdb entry |
http://www.debian.org/security/2005/dsa-916 | vendor advisory |
http://securityreason.com/securityalert/58 | third party advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=330894 | |
http://secunia.com/advisories/17662 | third party advisory patch vendor advisory |