First published: Mon Feb 04 2013(Updated: )
A security flaw was found in the way UTF-8 decoder of boost, set of free peer-reviewed portable C++ source libraries, performed validation of certain UTF-8 encoded sequences. If an application, linked against boost used the UTF-8 decoding routines for input validation (and depended at the results), an attacker could use this flaw to confuse the validator into (errorneously) accepting them as valid. Upstream bug report: [1] <a href="https://svn.boost.org/trac/boost/ticket/7743">https://svn.boost.org/trac/boost/ticket/7743</a> Upstream advisory: [2] <a href="http://www.boost.org/users/news/boost_locale_security_notice.html">http://www.boost.org/users/news/boost_locale_security_notice.html</a> Relevant upstream patch: [3] <a href="http://cppcms.com/files/locale/boost_locale_utf.patch">http://cppcms.com/files/locale/boost_locale_utf.patch</a> References: [4] <a href="http://www.openwall.com/lists/oss-security/2013/02/04/1">http://www.openwall.com/lists/oss-security/2013/02/04/1</a> [5] <a href="http://www.openwall.com/lists/oss-security/2013/02/04/2">http://www.openwall.com/lists/oss-security/2013/02/04/2</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Boost C++ Libraries |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-907481 is considered moderate due to potential input validation issues.
To fix REDHAT-BUG-907481, update to the latest version of Boost that addresses the UTF-8 decoding issue.
The risks associated with REDHAT-BUG-907481 include data corruption and potential security vulnerabilities from improper UTF-8 input handling.
All versions of Boost that implement the flawed UTF-8 decoding routines are affected by REDHAT-BUG-907481.
A temporary workaround for REDHAT-BUG-907481 may include manually validating UTF-8 encoded sequences before processing them.