123elf Project Buffer Overflow

2022.09.06
Credit: Tavis Ormandy
Risk: High
Local: Yes
Remote: No
CVE: N/A
CWE: CWE-119

# About The 123 command is a spreadsheet application for UNIX-based systems that can be used in interactive mode to create and modify financial and scientific models. For more information, see https://123r3.net # Advisory A stack buffer overflow was reported in the cell format processing routines. If a victim opens an untrusted malicious worksheet, code execution could occur. There have been no reports of this vulnerability being exploited in the wild. We take your security very seriously, in fact, this is the first known vulnerability reported in Lotus 1-2-3 R3 since it's release in September 1990. # Credit This issue was reported to the 123elf project by dbastone. # Solution A new release has been prepared to resolve this issue, we recommend affected users upgrade immediately. https://github.com/taviso/123elf/ Lotus 1-2-3 releases for other platforms are affected, but are not actively maintained. MS-DOS, OS/2, OpenVMS, z/OS and SysV/386 users are advised to migrate to Linux to continue receiving updates. -- _o) $ lynx lock.cmpxchg8b.com /\\ _o) _o) $ finger taviso@sdf.org _\_V _( ) _( ) @taviso


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top