|
Message-ID: <2650419.lEoOq43ulC@devil> Date: Mon, 22 Apr 2013 13:01:17 +0200 From: Agostino Sarubbo <ago@...too.org> To: oss-security@...ts.openwall.com Subject: CVE request: libxmp MASI Parsing Buffer Overflow Vulnerability >From the secunia advisory SA53114[1]: Description A vulnerability has been reported in libxmp, which can be exploited by malicious people to compromise an application using the library. The vulnerability is caused due to a boundary error in the "get_dsmp"() function (src/loaders/masi_load.c) when parsing MASI files, which can be exploited to cause a buffer overflow. Successful exploitation may allow execution of arbitrary code. The vulnerability is reported in versions prior to 4.1.0. Solution Update to version 4.1.0. Provided and/or discovered by The vendor credits Douglas Carmichael. Original Advisory http://sourceforge.net/projects/xmp/files/libxmp/4.1.0/Changelog/view Commit: http://sourceforge.net/p/xmp/libxmp/ci/a015fdfb478a60172fd225632a11bbd02870fc40/ [1]: https://secunia.com/advisories/53114/ -- Agostino Sarubbo Gentoo Linux Developer
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.