int(2804)

Vulnerability Bulletins


Múltiples desbordamientos de entero en wvWare

Vulnerability classification

Property Value
Confidence level Oficial
Impact Obtener acceso
Dificulty Experto
Required attacker level Acceso remoto sin cuenta a un servicio exotico

System information

Property Value
Affected manufacturer GNU/Linux
Affected software wvWare < 1.2.3

Description

Se han descubierto múltiples desbordabientos de enteros en wvWare versiones anteriores a 1.2.3 que lo utilizan AbiWord, Kword y posiblemente otros productos. La vulnerabilidad reside en un error no especificado

Un atacante remoto podría ejecutar código arbitrario mediante archivos de Microsoft Word (extensión DOC) especialmente construidos que producen valores "LFO clfolvl" extremadamente largos en la función "wvGetLFO_records()" o valores "LFO nolfo" extremadamente largos en la función "wvGetLFO_PLF()".

Solution



Actualización de software

Mandriva

Corporate Server 3.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/libwv-1.0_0-1.0.0-1.3.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/libwv-1.0_0-devel-1.0.0-1.3.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/wv-1.0.0-1.3.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/wv-1.0.0-1.3.C30mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/lib64wv-1.0_0-1.0.0-1.3.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/lib64wv-1.0_0-devel-1.0.0-1.3.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/wv-1.0.0-1.3.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/wv-1.0.0-1.3.C30mdk.src.rpm

Mandriva Linux 2006
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/i586/libwv-1.0_3-1.0.3-3.1.20060mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/i586/libwv-1.0_3-devel-1.0.3-3.1.20060mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/i586/wv-1.0.3-3.1.20060mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/wv-1.0.3-3.1.20060mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/x86_64/lib64wv-1.0_3-1.0.3-3.1.20060mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/x86_64/lib64wv-1.0_3-devel-1.0.3-3.1.20060mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/x86_64/wv-1.0.3-3.1.20060mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/wv-1.0.3-3.1.20060mdk.src.rpm

Mandriva Linux 2007
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/libwv-1.2_0-1.2.0-6.1mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/libwv-1.2_0-devel-1.2.0-6.1mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/wv-1.2.0-6.1mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/wv-1.2.0-6.1mdv2007.0.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/lib64wv-1.2_0-1.2.0-6.1mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/lib64wv-1.2_0-devel-1.2.0-6.1mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/wv-1.2.0-6.1mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/wv-1.2.0-6.1mdv2007.0.src.rpm

Suse Linux
Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux

Standar resources

Property Value
CVE CVE-2006-4513
BID 20761

Other resources

Mandriva Security Advisory (MDKSA-2006:202)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:202

SUSE Security Advisory (SUSE-SR:2006:028)
http://www.novell.com/linux/security/advisories/2006_28_sr.html

Version history

Version Comments Date
1.0 Aviso emitido 2006-11-08
1.1 Aviso emitido por Suse (SUSE-SR:2006:028) 2006-12-14
Ministerio de Defensa
CNI
CCN
CCN-CERT