First published: Mon Feb 04 2013(Updated: )
A security flaw was found in the way UTF-8 decoder of boost, set of free peer-reviewed portable C++ source libraries, performed validation of certain UTF-8 encoded sequences. If an application, linked against boost used the UTF-8 decoding routines for input validation (and depended at the results), an attacker could use this flaw to confuse the validator into (errorneously) accepting them as valid. Upstream bug report: [1] <a href="https://svn.boost.org/trac/boost/ticket/7743">https://svn.boost.org/trac/boost/ticket/7743</a> Upstream advisory: [2] <a href="http://www.boost.org/users/news/boost_locale_security_notice.html">http://www.boost.org/users/news/boost_locale_security_notice.html</a> Relevant upstream patch: [3] <a href="http://cppcms.com/files/locale/boost_locale_utf.patch">http://cppcms.com/files/locale/boost_locale_utf.patch</a> References: [4] <a href="http://www.openwall.com/lists/oss-security/2013/02/04/1">http://www.openwall.com/lists/oss-security/2013/02/04/1</a> [5] <a href="http://www.openwall.com/lists/oss-security/2013/02/04/2">http://www.openwall.com/lists/oss-security/2013/02/04/2</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Boost C++ Libraries | =1.48.0 | |
Boost C++ Libraries | =1.49.0 | |
Boost C++ Libraries | =1.50.0 | |
Boost C++ Libraries | =1.51.0 | |
Boost C++ Libraries | =1.52.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0252 has been classified as a medium severity vulnerability due to its potential impact on applications relying on improper UTF-8 input validation.
To fix CVE-2013-0252, you should update your Boost library to version 1.53.0 or later, where the vulnerability has been addressed.
CVE-2013-0252 affects Boost versions 1.48.0 through 1.52.0.
Applications linked against vulnerable versions of Boost may misinterpret UTF-8 encoded sequences, leading to potential security risks.
It is unsafe to use Boost versions earlier than 1.53.0, as they are susceptible to the vulnerabilities outlined in CVE-2013-0252.