blob: ba5244f2c481cd68d3abea9d083f2d55a16ebd88 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200608-17">
<title>libwmf: Buffer overflow vulnerability</title>
libwmf is vulnerable to an integer overflow potentially resulting in the
execution of arbitrary code.
<product type="ebuild">libwmf</product>
<announced>August 10, 2006</announced>
<revised>August 10, 2006: 01</revised>
<package name="media-libs/libwmf" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="lt"></vulnerable>
libwmf is a library for reading and converting vector images in
Microsoft's native Windows Metafile Format (WMF).
infamous41md discovered that libwmf fails to do proper bounds checking
on the MaxRecordSize variable in the WMF file header. This could lead
to an head-based buffer overflow.
<impact type="normal">
By enticing a user to open a specially crafted WMF file, a remote
attacker could cause a heap-based buffer overflow and execute arbitrary
code with the permissions of the user running the application that uses
There is no known workaround for this issue.
All libwmf users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libwmf-;</code>
<uri link="">CVE-2006-3376</uri>
<metadata tag="requester" timestamp="Mon, 07 Aug 2006 08:01:55 +0000">
<metadata tag="submitter" timestamp="Mon, 07 Aug 2006 12:39:07 +0000">
<metadata tag="bugReady" timestamp="Tue, 08 Aug 2006 11:33:41 +0000">