Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200702-12 ] CHMlib: User-assisted remote execution of arbitrary code
Date: Tue, 27 Feb 2007 15:53:35
Message-Id: 20070227152351.GE931@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200702-12
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: CHMlib: User-assisted remote execution of arbitrary code
9 Date: February 27, 2007
10 Bugs: #163989
11 ID: 200702-12
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A memory corruption vulnerability in CHMlib could lead to the remote
19 execution of arbitrary code.
20
21 Background
22 ==========
23
24 CHMlib is a library for the MS CHM (Compressed HTML) file format plus
25 extracting and HTTP server utils.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 app-doc/chmlib < 0.39 >= 0.39
34
35 Description
36 ===========
37
38 When certain CHM files that contain tables and objects stored in pages
39 are parsed by CHMlib, an unsanitized value is passed to the alloca()
40 function resulting in a shift of the stack pointer to arbitrary memory
41 locations.
42
43 Impact
44 ======
45
46 An attacker could entice a user to open a specially crafted CHM file,
47 resulting in the execution of arbitrary code with the permissions of
48 the user viewing the file.
49
50 Workaround
51 ==========
52
53 There is no known workaround at this time.
54
55 Resolution
56 ==========
57
58 All CHMlib users should upgrade to the latest version:
59
60 # emerge --sync
61 # emerge --ask --oneshot --verbose ">=app-doc/chmlib-0.39"
62
63 References
64 ==========
65
66 [ 1 ] Original Advisory
67 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=468
68 [ 2 ] CVE-2007-0619
69 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0619
70
71 Availability
72 ============
73
74 This GLSA and any updates to it are available for viewing at
75 the Gentoo Security Website:
76
77 http://security.gentoo.org/glsa/glsa-200702-12.xml
78
79 Concerns?
80 =========
81
82 Security is a primary focus of Gentoo Linux and ensuring the
83 confidentiality and security of our users machines is of utmost
84 importance to us. Any security concerns should be addressed to
85 security@g.o or alternatively, you may file a bug at
86 http://bugs.gentoo.org.
87
88 License
89 =======
90
91 Copyright 2007 Gentoo Foundation, Inc; referenced text
92 belongs to its owner(s).
93
94 The contents of this document are licensed under the
95 Creative Commons - Attribution / Share Alike license.
96
97 http://creativecommons.org/licenses/by-sa/2.5