zgv PCD Image Processing Overflow

2004-10-25T20:07:17
ID OSVDB:11235
Type osvdb
Reporter infamous41md(infamous41md@hotpop.com)
Modified 2004-10-25T20:07:17

Description

Vulnerability Description

A remote overflow exists in zgv. zgv fails to perform boundary checking of user-supplied data from PCD image headers in readpcd.c, resulting in a heap overflow. Using a specially crafted PCD file, an attacker could possibly cause remote code execution resulting in a loss of integrity.

Solution Description

Currently, there are no known workarounds or upgrades to correct this issue. However, Russell Marks has released a patch to address this vulnerability.

Short Description

A remote overflow exists in zgv. zgv fails to perform boundary checking of user-supplied data from PCD image headers in readpcd.c, resulting in a heap overflow. Using a specially crafted PCD file, an attacker could possibly cause remote code execution resulting in a loss of integrity.

References:

Vendor URL: http://www.svgalib.org/rus/zgv/ Vendor Specific Solution URL: http://www.svgalib.org/rus/zgv/zgv-5.8-integer-overflow-fix.diff Vendor Specific Advisory URL Security Tracker: 1011951 Secunia Advisory ID:12998 Secunia Advisory ID:13107 Related OSVDB ID: 11205 Related OSVDB ID: 11208 Related OSVDB ID: 11207 Related OSVDB ID: 11211 Related OSVDB ID: 11213 Related OSVDB ID: 11212 Related OSVDB ID: 11206 Related OSVDB ID: 11209 Related OSVDB ID: 11210 Other Advisory URL: http://security.gentoo.org/glsa/glsa-200411-12.xml Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2004-10/0283.html ISS X-Force ID: 17871 Bugtraq ID: 11556