Lucene search

K
gentooGentoo FoundationGLSA-200505-08
HistoryMay 10, 2005 - 12:00 a.m.

HT Editor: Multiple buffer overflows

2005-05-1000:00:00
Gentoo Foundation
security.gentoo.org
19

5.1 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

81.5%

Background

HT is a hex editor, designed to help analyse and modify executable files.

Description

Tavis Ormandy of the Gentoo Linux Security Team discovered an integer overflow in the ELF parser, leading to a heap-based buffer overflow. The vendor has reported that an unrelated buffer overflow has been discovered in the PE parser.

Impact

Successful exploitation would require the victim to open a specially crafted file using HT, potentially permitting an attacker to execute arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

All hteditor users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-editors/hteditor-0.8.0-r2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-editors/hteditor< 0.8.0-r2UNKNOWN

5.1 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

81.5%