From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([208.92.234.80] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1MmVW4-0002Uv-O6 for garchives@archives.gentoo.org; Sat, 12 Sep 2009 16:32:01 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 2B6C0E07AB; Sat, 12 Sep 2009 16:30:33 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) by pigeon.gentoo.org (Postfix) with ESMTP id 03C8AE0879 for ; Sat, 12 Sep 2009 16:29:10 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp.gentoo.org (Postfix) with ESMTP id A547D6694E for ; Sat, 12 Sep 2009 16:29:09 +0000 (UTC) X-Virus-Scanned: amavisd-new at gentoo.org X-Spam-Score: -3.2 X-Spam-Level: X-Spam-Status: No, score=-3.2 required=5.5 tests=[AWL=-0.601, BAYES_00=-2.599] Received: from smtp.gentoo.org ([127.0.0.1]) by localhost (smtp.gentoo.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bji0rKARvzQg for ; Sat, 12 Sep 2009 16:29:02 +0000 (UTC) Received: from mail.netloc.info (mail.netloc.info [84.16.251.62]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTP id 68D1965C3C for ; Sat, 12 Sep 2009 16:29:02 +0000 (UTC) Received: from neon (p50819AEF.dip0.t-ipconnect.de [80.129.154.239]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (Client did not present a certificate) by mail.netloc.info (Postfix) with ESMTPSA id 1E08D9FA72; Sat, 12 Sep 2009 18:28:58 +0200 (CEST) Date: Sat, 12 Sep 2009 18:28:36 +0200 From: Alex Legler To: gentoo-announce@lists.gentoo.org Cc: bugtraq@securityfocus.com, full-disclosure@lists.grok.org.uk, security-alerts@linuxsecurity.com Subject: [gentoo-announce] [ GLSA 200909-12 ] HTMLDOC: User-assisted execution of arbitrary code Message-ID: <20090912182836.7c526195@neon> X-Mailer: Claws Mail 3.7.2 (GTK+ 2.16.5; x86_64-pc-linux-gnu) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-announce@lists.gentoo.org Mime-Version: 1.0 Content-Type: multipart/signed; micalg=PGP-SHA1; boundary="Sig_/4OrYQf8RYfr.zY06mSbGnEC"; protocol="application/pgp-signature" X-Archives-Salt: 42d7ed8b-4eff-49a9-93f3-9e3c8ab19ea4 X-Archives-Hash: 3979883db43a9d74e2418bbfa2eee0b7 --Sig_/4OrYQf8RYfr.zY06mSbGnEC Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200909-12 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: HTMLDOC: User-assisted execution of arbitrary code Date: September 12, 2009 Bugs: #278186 ID: 200909-12 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis =3D=3D=3D=3D=3D=3D=3D=3D Multiple insecure calls to the sscanf() function in HTMLDOC might result in the execution of arbitrary code. Background =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D HTMLDOC is a HTML indexer and HTML to PS and PDF converter. Affected packages =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-text/htmldoc < 1.8.27-r1 >=3D 1.8.27-r1 Description =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D ANTHRAX666 reported an insecure call to the sscanf() function in the set_page_size() function in htmldoc/util.cxx. Nico Golde of the Debian Security Team found two more insecure calls in the write_type1() function in htmldoc/ps-pdf.cxx and the htmlLoadFontWidths() function in htmldoc/htmllib.cxx. Impact =3D=3D=3D=3D=3D=3D A remote attacker could entice a user to process a specially crafted HTML file using htmldoc, possibly resulting in the execution of arbitrary code with the privileges of the user running the application. NOTE: Additional vectors via specially crafted AFM font metric files do not cross trust boundaries, as the files can only be modified by privileged users. Workaround =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D There is no known workaround at this time. Resolution =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D All HTMLDOC users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose =3Dapp-text/htmldoc-1.8.27-r1 References =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D [ 1 ] CVE-2009-3050 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2009-3050 Availability =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200909-12.xml Concerns? =3D=3D=3D=3D=3D=3D=3D=3D=3D Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License =3D=3D=3D=3D=3D=3D=3D Copyright 2009 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 --Sig_/4OrYQf8RYfr.zY06mSbGnEC Content-Type: application/pgp-signature; name=signature.asc Content-Disposition: attachment; filename=signature.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.11 (GNU/Linux) iEYEARECAAYFAkqrzEMACgkQk+oqhfPAZGmFDACfUZXjH7zyALw71kghoY8JLzf0 chgAn3kvcfF9V6JVrDO9v9SpHdh0aVS/ =uHm0 -----END PGP SIGNATURE----- --Sig_/4OrYQf8RYfr.zY06mSbGnEC--