First published: Wed Sep 02 2009(Updated: )
Buffer overflow in the set_page_size function in util.cxx in HTMLDOC 1.8.27 and earlier allows context-dependent attackers to execute arbitrary code via a long MEDIA SIZE comment. NOTE: it was later reported that there were additional vectors in htmllib.cxx and ps-pdf.cxx using an AFM font file with a long glyph name, but these vectors do not cross privilege boundaries.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Htmldoc | =1.8.26 | |
Htmldoc | <=1.8.27 | |
Htmldoc | =1.8.24 | |
Htmldoc | =1.8.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3050 has a high severity rating due to the potential for arbitrary code execution.
To fix CVE-2009-3050, upgrade to HTMLDOC version 1.8.28 or later to mitigate the buffer overflow vulnerability.
CVE-2009-3050 affects HTMLDOC versions 1.8.27 and earlier, including 1.8.26, 1.8.25, and 1.8.24.
CVE-2009-3050 demonstrates a buffer overflow attack that can allow context-dependent attackers to execute arbitrary code.
Yes, there are known exploits for CVE-2009-3050 that target the vulnerability caused by long MEDIA SIZE comments.