Vulnerability Bulletins |
Múltiples desbordamientos de entero en wvWare |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Obtener acceso |
Dificulty | Experto |
Required attacker level | Acceso remoto sin cuenta a un servicio exotico |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software | wvWare < 1.2.3 |
Description |
|
Se han descubierto múltiples desbordabientos de enteros en wvWare versiones anteriores a 1.2.3 que lo utilizan AbiWord, Kword y posiblemente otros productos. La vulnerabilidad reside en un error no especificado Un atacante remoto podría ejecutar código arbitrario mediante archivos de Microsoft Word (extensión DOC) especialmente construidos que producen valores "LFO clfolvl" extremadamente largos en la función "wvGetLFO_records()" o valores "LFO nolfo" extremadamente largos en la función "wvGetLFO_PLF()". |
|
Solution |
|
Actualización de software Mandriva Corporate Server 3.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/libwv-1.0_0-1.0.0-1.3.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/libwv-1.0_0-devel-1.0.0-1.3.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/wv-1.0.0-1.3.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/wv-1.0.0-1.3.C30mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/lib64wv-1.0_0-1.0.0-1.3.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/lib64wv-1.0_0-devel-1.0.0-1.3.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/wv-1.0.0-1.3.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/wv-1.0.0-1.3.C30mdk.src.rpm Mandriva Linux 2006 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/i586/libwv-1.0_3-1.0.3-3.1.20060mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/i586/libwv-1.0_3-devel-1.0.3-3.1.20060mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/i586/wv-1.0.3-3.1.20060mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/wv-1.0.3-3.1.20060mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/x86_64/lib64wv-1.0_3-1.0.3-3.1.20060mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/x86_64/lib64wv-1.0_3-devel-1.0.3-3.1.20060mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/x86_64/wv-1.0.3-3.1.20060mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/wv-1.0.3-3.1.20060mdk.src.rpm Mandriva Linux 2007 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/libwv-1.2_0-1.2.0-6.1mdv2007.0.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/libwv-1.2_0-devel-1.2.0-6.1mdv2007.0.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/wv-1.2.0-6.1mdv2007.0.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/wv-1.2.0-6.1mdv2007.0.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/lib64wv-1.2_0-1.2.0-6.1mdv2007.0.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/lib64wv-1.2_0-devel-1.2.0-6.1mdv2007.0.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/wv-1.2.0-6.1mdv2007.0.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/wv-1.2.0-6.1mdv2007.0.src.rpm Suse Linux Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux |
|
Standar resources |
|
Property | Value |
CVE | CVE-2006-4513 |
BID | 20761 |
Other resources |
|
Mandriva Security Advisory (MDKSA-2006:202) http://www.mandriva.com/security/advisories?name=MDKSA-2006:202 SUSE Security Advisory (SUSE-SR:2006:028) http://www.novell.com/linux/security/advisories/2006_28_sr.html |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2006-11-08 |
1.1 | Aviso emitido por Suse (SUSE-SR:2006:028) | 2006-12-14 |