Lucene search

K
gentooGentoo FoundationGLSA-200406-14
HistoryJun 17, 2004 - 12:00 a.m.

aspell: Buffer overflow in word-list-compress

2004-06-1700:00:00
Gentoo Foundation
security.gentoo.org
19

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0

Percentile

0.4%

Background

aspell is a popular spell-checker. Dictionaries are available for many languages.

Description

aspell includes a utility for handling wordlists called word-list-compress. This utility fails to do proper bounds checking when processing words longer than 256 bytes.

Impact

If an attacker could entice a user to handle a wordlist containing very long word lengths it could result in the execution of arbitrary code with the permissions of the user running the program.

Workaround

There is no known workaround at this time. All users are encouraged to upgrade to the latest available version.

Resolution

All users should upgrade to the latest available version of aspell.

 # emerge sync
 
 # emerge -pv ">=app-text/aspell-0.50.5-r4"
 # emerge ">=app-text/aspell-0.50.5-r4"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-text/aspell<= 0.50.5-r3UNKNOWN

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0

Percentile

0.4%