First published: Fri Jun 11 2004(Updated: )
Multiple stack-based buffer overflows in the word-list-compress functionality in compress.c for Aspell allow local users to execute arbitrary code via a long entry in the wordlist that is not properly handled when using the (1) "c" compress option or (2) "d" decompress option.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Aspell | =0.50.5 | |
Gentoo Linux | =1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0548 is classified as a high-severity vulnerability due to its potential for local users to execute arbitrary code.
To fix CVE-2004-0548, upgrade to a patched version of GNU Aspell that addresses the buffer overflow issues.
CVE-2004-0548 affects GNU Aspell version 0.50.5 and Gentoo Linux version 1.4.
CVE-2004-0548 requires local access for exploitation, as it involves local user input through the word-list-compress functionality.
If CVE-2004-0548 is present, it is recommended to immediately update your software and review user permissions to limit potential exploitation.