Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200511-23 ] chmlib, KchmViewer: Stack-based buffer overflow
Date: Mon, 28 Nov 2005 10:35:50
Message-Id: 438AD987.6010800@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200511-23
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: chmlib, KchmViewer: Stack-based buffer overflow
9 Date: November 28, 2005
10 Bugs: #110557
11 ID: 200511-23
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 chmlib and KchmViewer contain a buffer overflow vulnerability which may
19 lead to the execution of arbitrary code.
20
21 Background
22 ==========
23
24 chmlib is a library for dealing with Microsoft ITSS and CHM format
25 files. KchmViewer is a CHM viewer that includes its own copy of the
26 chmlib library.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 app-doc/chmlib < 0.37.4 >= 0.37.4
35 2 app-doc/kchmviewer < 1.1 >= 1.1
36 -------------------------------------------------------------------
37 2 affected packages on all of their supported architectures.
38 -------------------------------------------------------------------
39
40 Description
41 ===========
42
43 Sven Tantau reported about a buffer overflow vulnerability in chmlib.
44 The function "_chm_decompress_block()" does not properly perform
45 boundary checking, resulting in a stack-based buffer overflow.
46
47 Impact
48 ======
49
50 By convincing a user to open a specially crafted ITSS or CHM file,
51 using KchmViewer or a program makes use of chmlib, a remote attacker
52 could execute arbitrary code with the privileges of the user running
53 the software.
54
55 Workaround
56 ==========
57
58 There is no known workaround at this time.
59
60 Resolution
61 ==========
62
63 All chmlib users should upgrade to the latest version:
64
65 # emerge --sync
66 # emerge --ask --oneshot --verbose ">=app-doc/chmlib-0.37.4"
67
68 All KchmViewer users should upgrade to the latest version:
69
70 # emerge --sync
71 # emerge --ask --oneshot --verbose ">=app-doc/kchmviewer-1.1"
72
73 References
74 ==========
75
76 [ 1 ] CVE-2005-3318
77 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3318
78
79 Availability
80 ============
81
82 This GLSA and any updates to it are available for viewing at
83 the Gentoo Security Website:
84
85 http://security.gentoo.org/glsa/glsa-200511-23.xml
86
87 Concerns?
88 =========
89
90 Security is a primary focus of Gentoo Linux and ensuring the
91 confidentiality and security of our users machines is of utmost
92 importance to us. Any security concerns should be addressed to
93 security@g.o or alternatively, you may file a bug at
94 http://bugs.gentoo.org.
95
96 License
97 =======
98
99 Copyright 2005 Gentoo Foundation, Inc; referenced text
100 belongs to its owner(s).
101
102 The contents of this document are licensed under the
103 Creative Commons - Attribution / Share Alike license.
104
105 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature