blob: 08c8a70a3cab73d6f965aa128cde9c8c06f88b25 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200412-18">
<title>abcm2ps: Buffer overflow vulnerability</title>
abcm2ps is vulnerable to a buffer overflow that could lead to remote
execution of arbitrary code.
<product type="ebuild">abcm2ps</product>
<announced>December 19, 2004</announced>
<revised>December 19, 2004: 02</revised>
<package name="media-sound/abcm2ps" auto="yes" arch="*">
<unaffected range="ge">3.7.21</unaffected>
<vulnerable range="lt">3.7.21</vulnerable>
abcm2ps is a utility used to convert ABC music sheet files into
PostScript format.
Limin Wang has located a buffer overflow inside the put_words()
function in the abcm2ps code.
<impact type="normal">
A remote attacker could convince the victim to download a
specially-crafted ABC file. Upon execution, this file would trigger the
buffer overflow and lead to the execution of arbitrary code with the
permissions of the user running abcm2ps.
There is no known workaround at this time.
All abcm2ps users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-sound/abcm2ps-3.7.21&quot;</code>
<uri link="">abcm2ps ChangeLog</uri>
<uri link="">Secunia Advisory</uri>
<metadata tag="requester" timestamp="Sun, 19 Dec 2004 01:45:11 +0000">
<metadata tag="bugReady" timestamp="Sun, 19 Dec 2004 14:05:57 +0000">
<metadata tag="submitter" timestamp="Sun, 19 Dec 2004 16:00:19 +0000">