First published: Thu Nov 30 2006(Updated: )
Heap-based buffer overflow in the ole_info_read_metabat function in Gnome Structured File library (libgsf) 1.14.0, and other versions before 1.14.2, allows context-dependent attackers to execute arbitrary code via a large num_metabat value in an OLE document, which causes the ole_init_info function to allocate insufficient memory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
libgsf | =1.13.2 | |
libgsf | =1.14 | |
libgsf | =1.11.1 | |
libgsf | =1.14.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4514 is considered a high severity vulnerability due to its potential for arbitrary code execution.
CVE-2006-4514 affects libgsf versions 1.11.1, 1.13.2, and 1.14.0.
To fix CVE-2006-4514, upgrade to libgsf version 1.14.2 or later.
Yes, CVE-2006-4514 can be exploited by attackers in a context-dependent manner through malicious OLE documents.
CVE-2006-4514 enables buffer overflow attacks that can lead to arbitrary code execution.