Multiple integer overflows in LibThai before 0.1.13 might allow context-dependent attackers to execute arbitrary code via long strings that trigger heap-based buffer overflows, related to (1) thbrk/thbrk.c and (2) thwbrk/thwbrk.c. NOTE: some of these details are obtained from third party information.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://secunia.com/advisories/38213 | third party advisory vendor advisory |
http://secunia.com/advisories/38235 | third party advisory |
http://www.debian.org/security/2010/dsa-1971 | vendor advisory |
http://security.debian.org/pool/updates/main/libt/libthai/libthai_0.1.6-1+etch1.diff.gz | patch |
http://ubuntu.com/usn/usn-887-1 | vendor advisory |
http://linux.thai.net/svn/software/libthai/tags/r_0_1_13/ChangeLog | |
http://secunia.com/advisories/38196 | third party advisory vendor advisory |
http://security.debian.org/pool/updates/main/libt/libthai/libthai_0.1.9-4+lenny1.diff.gz | patch |
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00000.html | vendor advisory |
http://linux.thai.net/node/184 | |
http://www.securityfocus.com/bid/37822 | vdb entry |
http://secunia.com/advisories/38420 | third party advisory |