Multiple buffer overflows in abcm2ps before 5.9.12 might allow remote attackers to execute arbitrary code via (1) a crafted input file, related to the PUT0 and PUT1 output macros; (2) a crafted input file, related to the trim_title function; and possibly (3) a long -O option on a command line.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2010/04/08/6 | mailing list third party advisory patch |
http://www.vupen.com/english/advisories/2011/0390 | vdb entry third party advisory |
http://www.securityfocus.com/bid/39271 | vdb entry third party advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577014 | issue tracking mailing list third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=580435 | issue tracking third party advisory patch |
http://secunia.com/advisories/43338 | third party advisory |
http://www.openwall.com/lists/oss-security/2010/04/08/7 | mailing list third party advisory patch |
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054015.html | third party advisory vendor advisory |
http://moinejf.free.fr/abcm2ps-5.txt | broken link |
http://secunia.com/advisories/39345 | third party advisory |
http://www.openwall.com/lists/oss-security/2010/04/08/5 | mailing list third party advisory patch |