Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200511-23] chmlib, KchmViewer: Stack-based buffer overflow


Vulnerability Assessment Details

[GLSA-200511-23] chmlib, KchmViewer: Stack-based buffer overflow

Vulnerability Assessment Summary
chmlib, KchmViewer: Stack-based buffer overflow

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200511-23
(chmlib, KchmViewer: Stack-based buffer overflow)


Sven Tantau reported about a buffer overflow vulnerability in
chmlib. The function "_chm_decompress_block()" does not properly
perform boundary checking, resulting in a stack-based buffer overflow.

Impact

By convincing a user to open a specially crafted ITSS or CHM file,
using KchmViewer or a program makes use of chmlib, a remote attacker
could execute arbitrary code with the rights of the user running
the software.

Workaround

There is no known workaround at this time.

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3318


Solution:
All chmlib users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-doc/chmlib-0.37.4"
All KchmViewer users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-doc/kchmviewer-1.1"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

Intel Xeon X3230 SLACS 2.66GHZ LGA775 Quad Core CPU Processor
$22.0
Intel Xeon X3230 SLACS 2.66GHZ LGA775 Quad Core CPU Processor pictureDell PowerEdge R610 2x X5650 2.66GHz 6 Core 16GB 6x 256GB SATA SSD PERC 6/i
$1100.0
Dell PowerEdge R610 2x X5650 2.66GHz 6 Core 16GB 6x 256GB SATA SSD PERC 6/i pictureDell PowerEdge R610 2x X5650 2.66GHz 6 Core 32GB 6x 512GB SATA SSD PERC 6/i
$1500.0
Dell PowerEdge R610 2x X5650 2.66GHz 6 Core 32GB 6x 512GB SATA SSD PERC 6/i pictureDell PowerEdge R610 2x X5660 2.8GHz 6 Core 16GB 6x 600GB 10K SAS PERC 6/i
$1490.0
Dell PowerEdge R610 2x X5660 2.8GHz 6 Core 16GB 6x 600GB 10K SAS PERC 6/i picture


Discussions

No Discussions have been posted on this vulnerability.