Vulnerability Name:

CVE-2005-2930 (CCN-40631)

Assigned:2005-10-28
Published:2005-10-28
Updated:2011-08-02
Summary:Stack-based buffer overflow in the _chm_find_in_PMGL function in chm_lib.c for chmlib before 0.36, as used in products such as KchmViewer, allows user-assisted attackers to execute arbitrary code via a CHM file containing a long element, a different vulnerability than CVE-2005-3318.
CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
3.8 Low (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2005-2930

Source: CCN
Type: CHM lib Web site
CHM lib

Source: CCN
Type: SA17775
KchmViewer chmlib Buffer Overflow Vulnerabilities

Source: SECUNIA
Type: Patch, Vendor Advisory
17775

Source: SREASON
Type: UNKNOWN
125

Source: CCN
Type: SECTRACK ID: 1015120
chmlib Buffer Overflow in *_chm_find_in_PMGL() Lets Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: Patch, Vendor Advisory
1015120

Source: CCN
Type: SourceForge.net
KchmViewer

Source: IDEFENSE
Type: Patch, Vendor Advisory
20051028 Multiple Vendor chmlib CHM File Handling Buffer Overflow Vulnerability

Source: BID
Type: Patch
15234

Source: CCN
Type: BID-15234
Jed Wing CHM Lib _chm_find_in_PMGL Stack Buffer Overflow Vulnerability

Source: VUPEN
Type: Vendor Advisory
ADV-2005-2249

Source: XF
Type: UNKNOWN
chmlib-chmfindinpmgl-bo(40631)

Source: CCN
Type: iDefense Labs PUBLIC ADVISORY: 10.28.05
Multiple Vendor chmlib CHM File Handling Buffer Overflow Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:jed_wing:chm_lib:0.1:*:*:*:*:*:*:*
  • OR cpe:/a:jed_wing:chm_lib:0.2:*:*:*:*:*:*:*
  • OR cpe:/a:jed_wing:chm_lib:0.3:*:*:*:*:*:*:*
  • OR cpe:/a:jed_wing:chm_lib:0.31:*:*:*:*:*:*:*
  • OR cpe:/a:jed_wing:chm_lib:0.32:*:*:*:*:*:*:*
  • OR cpe:/a:jed_wing:chm_lib:0.33:*:*:*:*:*:*:*
  • OR cpe:/a:jed_wing:chm_lib:0.35:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:jed_wing:chm_lib:0.35:*:*:*:*:*:*:*
  • OR cpe:/a:jed_wing:chm_lib:0.33:*:*:*:*:*:*:*
  • OR cpe:/a:jed_wing:chm_lib:0.32:*:*:*:*:*:*:*
  • OR cpe:/a:jed_wing:chm_lib:0.31:*:*:*:*:*:*:*
  • OR cpe:/a:jed_wing:chm_lib:0.3:*:*:*:*:*:*:*
  • OR cpe:/a:jed_wing:chm_lib:0.2:*:*:*:*:*:*:*
  • OR cpe:/a:jed_wing:chm_lib:0.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:886
    V
    several vulnerabilities
    2005-11-07
    BACK
    jed_wing chm lib 0.1
    jed_wing chm lib 0.2
    jed_wing chm lib 0.3
    jed_wing chm lib 0.31
    jed_wing chm lib 0.32
    jed_wing chm lib 0.33
    jed_wing chm lib 0.35
    jed_wing chm lib 0.35
    jed_wing chm lib 0.33
    jed_wing chm lib 0.32
    jed_wing chm lib 0.31
    jed_wing chm lib 0.3
    jed_wing chm lib 0.2
    jed_wing chm lib 0.1