First published: Wed Mar 14 2012(Updated: )
It was reported [1] that an integer overflow in GNU Gnash's GnashImage::size() method could be exploited to cause a heap-based buffer overflow when opening certain specially-crafted SWF files. If a user were tricked into opening a malicious SWF file it cause cause Gnash to crash or, possibly, execute arbitrary code with the permissions of the user running Gnash. The flaw was reported in 0.8.10 and is fixed in git [2]. [1] <a href="http://secunia.com/advisories/47183">http://secunia.com/advisories/47183</a> [2] <a href="http://git.savannah.gnu.org/cgit/gnash.git/commit/?id=bb4dc77eecb6ed1b967e3ecbce3dac6c5e6f1527">http://git.savannah.gnu.org/cgit/gnash.git/commit/?id=bb4dc77eecb6ed1b967e3ecbce3dac6c5e6f1527</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Gnash | =0.8.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-803443 is considered critical due to the potential for remote code execution from a crafted SWF file.
To fix REDHAT-BUG-803443, update to the latest version of GNU Gnash following official patch instructions.
GNU Gnash version 0.8.10 is affected by REDHAT-BUG-803443.
REDHAT-BUG-803443 is an integer overflow vulnerability that can lead to a heap-based buffer overflow.
Opening a malicious SWF file may cause GNU Gnash to crash or potentially allow execution of arbitrary code.