Executive Summary

Summary
Title HTMLDOC: User-assisted execution of arbitrary code
Informations
Name GLSA-200909-12 First vendor Publication 2009-09-12
Vendor Gentoo Last vendor Modification 2009-09-12
Severity (Vendor) Normal Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

Multiple insecure calls to the sscanf() function in HTMLDOC might result in the execution of arbitrary code.

Background

HTMLDOC is a HTML indexer and HTML to PS and PDF converter.

Description

ANTHRAX666 reported an insecure call to the sscanf() function in the set_page_size() function in htmldoc/util.cxx. Nico Golde of the Debian Security Team found two more insecure calls in the write_type1()
function in htmldoc/ps-pdf.cxx and the htmlLoadFontWidths() function in htmldoc/htmllib.cxx.

Impact

A remote attacker could entice a user to process a specially crafted HTML file using htmldoc, possibly resulting in the execution of arbitrary code with the privileges of the user running the application.
NOTE: Additional vectors via specially crafted AFM font metric files do not cross trust boundaries, as the files can only be modified by privileged users.

Workaround

There is no known workaround at this time.

Resolution

All HTMLDOC users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose =app-text/htmldoc-1.8.27-r1

References

[ 1 ] CVE-2009-3050 : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3050

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200909-12.xml

Original Source

Url : http://security.gentoo.org/glsa/glsa-200909-12.xml

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3

OpenVAS Exploits

Date Description
2009-12-10 Name : Mandriva Security Advisory MDVSA-2009:231-1 (htmldoc)
File : nvt/mdksa_2009_231_1.nasl
2009-09-15 Name : Gentoo Security Advisory GLSA 200909-12 (htmldoc)
File : nvt/glsa_200909_12.nasl
2009-09-15 Name : Mandrake Security Advisory MDVSA-2009:231 (htmldoc)
File : nvt/mdksa_2009_231.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
55840 HTMLDOC htmldoc/util.cxx set_page_size() Function Overflow

Nessus® Vulnerability Scanner

Date Description
2009-12-22 Name : The remote openSUSE host is missing a security update.
File : suse_11_0_htmldoc-091211.nasl - Type : ACT_GATHER_INFO
2009-12-22 Name : The remote openSUSE host is missing a security update.
File : suse_11_1_htmldoc-091211.nasl - Type : ACT_GATHER_INFO
2009-12-22 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_htmldoc-091211.nasl - Type : ACT_GATHER_INFO
2009-09-14 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200909-12.nasl - Type : ACT_GATHER_INFO
2009-09-14 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2009-231.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:36:42
  • Multiple Updates