First published: Fri Jun 11 2004(Updated: )
Multiple stack-based buffer overflows in the word-list-compress functionality in compress.c for Aspell allow local users to execute arbitrary code via a long entry in the wordlist that is not properly handled when using the (1) "c" compress option or (2) "d" decompress option.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Aspell | =0.50.5 | |
Gentoo Linux | =1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.