Lucene search

K
gentooGentoo FoundationGLSA-200908-10
HistoryAug 18, 2009 - 12:00 a.m.

Dillo: User-assisted execution of arbitrary code

2009-08-1800:00:00
Gentoo Foundation
security.gentoo.org
10

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.047 Low

EPSS

Percentile

92.7%

Background

Dillo is a graphical web browser known for its speed and small footprint.

Description

Tilei Wang reported an integer overflow in the Png_datainfo_callback() function, possibly leading to a heap-based buffer overflow.

Impact

A remote attacker could entice a user to open an HTML document containing a specially crafted, large PNG image, possibly resulting in the execution of arbitrary code with the privileges of the user running the application.

Workaround

There is no known workaround at this time.

Resolution

All Dillo users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-client/dillo-2.1.1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-client/dillo< 2.1.1UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.047 Low

EPSS

Percentile

92.7%