pdflib long filename multiple bufferoverflows

2007.12.28
Credit: poplix
Risk: Medium
Local: Yes
Remote: No
CWE: CWE-119


Ogólna skala CVSS: 5.7/10
Znaczenie: 6.9/10
Łatwość wykorzystania: 5.5/10
Wymagany dostęp: Sieć lokalna
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Brak
Wpływ na dostępność: Pełny

hi, pdflib, a library for generating PDF on the fly, avilable at http:// www.pdflib.com, is vulnerable to multiple bufferoverflows due to a misuse of strcpy(). An attacker can exploit this issue to execute arbitrary code or to crash the application that uses the library. One of the vulnerable functions is pdc_fsearch_fopen() that is called, for example, by PDF_load_image() which overflows a stack buffer if a long filename is provided. The php wrapper for pdflib (pecl extension) is also vulnerable so please take care of allowing users to generate custom pdfs from webapps. this is a proof-of-concept that crashes php: <?php ..... PDF_load_image($p,"jpeg",str_repeat("A",1100), null); ?> The developers have been warned and they plained to fix those bugs in the next release. cheers, -poplix http://px.dynalias.org


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top