Lucene search

K
gentooGentoo FoundationGLSA-200511-23
HistoryNov 28, 2005 - 12:00 a.m.

chmlib, KchmViewer: Stack-based buffer overflow

2005-11-2800:00:00
Gentoo Foundation
security.gentoo.org
15

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.029

Percentile

90.9%

Background

chmlib is a library for dealing with Microsoft ITSS and CHM format files. KchmViewer is a CHM viewer that includes its own copy of the chmlib library.

Description

Sven Tantau reported about a buffer overflow vulnerability in chmlib. The function “_chm_decompress_block()” does not properly perform boundary checking, resulting in a stack-based buffer overflow.

Impact

By convincing a user to open a specially crafted ITSS or CHM file, using KchmViewer or a program makes use of chmlib, a remote attacker could execute arbitrary code with the privileges of the user running the software.

Workaround

There is no known workaround at this time.

Resolution

All chmlib users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-libs/chmlib-0.37.4"

All KchmViewer users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-text/kchmviewer-1.1"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-libs/chmlib< 0.37.4UNKNOWN
Gentooanyallapp-text/kchmviewer< 1.1UNKNOWN

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.029

Percentile

90.9%