First published: Mon Feb 04 2013(Updated: )
A security flaw was found in the way UTF-8 decoder of boost, set of free peer-reviewed portable C++ source libraries, performed validation of certain UTF-8 encoded sequences. If an application, linked against boost used the UTF-8 decoding routines for input validation (and depended at the results), an attacker could use this flaw to confuse the validator into (errorneously) accepting them as valid. Upstream bug report: [1] <a href="https://svn.boost.org/trac/boost/ticket/7743">https://svn.boost.org/trac/boost/ticket/7743</a> Upstream advisory: [2] <a href="http://www.boost.org/users/news/boost_locale_security_notice.html">http://www.boost.org/users/news/boost_locale_security_notice.html</a> Relevant upstream patch: [3] <a href="http://cppcms.com/files/locale/boost_locale_utf.patch">http://cppcms.com/files/locale/boost_locale_utf.patch</a> References: [4] <a href="http://www.openwall.com/lists/oss-security/2013/02/04/1">http://www.openwall.com/lists/oss-security/2013/02/04/1</a> [5] <a href="http://www.openwall.com/lists/oss-security/2013/02/04/2">http://www.openwall.com/lists/oss-security/2013/02/04/2</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Boost Boost | =1.48.0 | |
Boost Boost | =1.49.0 | |
Boost Boost | =1.50.0 | |
Boost Boost | =1.51.0 | |
Boost Boost | =1.52.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.