Multiple buffer overflows in World Wide Web Consortium (W3C) Amaya 9.4, and possibly other versions including 8.x before 8.8.5, allow remote attackers to execute arbitrary code via a long value in (1) the COMPACT attribute of the COLGROUP element, (2) the ROWS attribute of the TEXTAREA element, and (3) the COLOR attribute of the LEGEND element; and via other unspecified attack vectors consisting of "dozens of possible snippets."
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2006/1351 | vdb entry |
http://www.securityfocus.com/archive/1/430877/100/0/threaded | mailing list |
http://morph3us.org/advisories/20060412-amaya-94.txt | vendor advisory exploit |
http://secunia.com/advisories/19670 | patch vendor advisory third party advisory |
http://www.securityfocus.com/bid/17507 | vdb entry exploit |
http://www.osvdb.org/24624 | patch vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25791 | vdb entry |
http://www.securityfocus.com/archive/1/430879/100/0/threaded | mailing list |
http://www.osvdb.org/24623 | patch vdb entry |
http://morph3us.org/advisories/20060412-amaya-94-2.txt | vendor advisory exploit |