|
|
|
|
| |
Credit:
The information has been provided by iDefense.
The original article can be found at:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=446
|
| |
Vulnerable Systems:
* Gnome Structured File library(libgsf) version 1.14.0
Immune Systems:
* Gnome Structured File library(libgsf) version 1.14.2
The problem specifically exists in the 'ole_init_info' function; the function only obtains enough for the number specified in 'num_bat' when allocating memory. Later, when reading the file contents, the number specified in 'num_metabat' is used as the bounds for a loop. Due to insufficient validation of the aforementioned variables, an attacker could cause a heap overflow.
Successful exploitation of this vulnerability requires an attacker to persuade a user into opening a specially crafted OLE document. If successful, the attacker could execute arbitrary code with the permissions of the victim.
Inside of the 'ole_info_read_metabat' function, values read from the file are validated to be within a range which depends on the size of the file. Successful exploitation may be somewhat mitigated by this validation. However, as file size increases, the number of allowed values increases.
Vendor Status:
The libgsf maintainers have addressed this problem with version 1.14.2.
CVE Information:
CVE-2006-4514
Disclosure Timeline:
* 08/17/2006 - Initial vendor notification
* 08/17/2006 - Initial vendor response
* 11/30/2006 - Coordinated public disclosure
|
|
|
|
|