Heap-based buffer overflow in the open_man_file function in callbacks.c in gmanedit 0.4.1 allows remote attackers to execute arbitrary code via a crafted man page, which is not properly handled during utf8 conversion. NOTE: another overflow was reported using a configuration file, but that vector does not have a scenario that crosses privilege boundaries.
bugs.debian.org/cgi-bin/bugreport.cgi?bug=497835
www.openwall.com/lists/oss-security/2008/09/06/2
www.openwall.com/lists/oss-security/2008/09/09/13
www.openwall.com/lists/oss-security/2008/09/09/19
www.securityfocus.com/bid/31040
exchange.xforce.ibmcloud.com/vulnerabilities/44962
exchange.xforce.ibmcloud.com/vulnerabilities/44963