Vulnerability Name:

CVE-2009-3050 (CCN-51701)

Assigned:2009-07-13
Published:2009-07-13
Updated:2009-09-10
Summary:Buffer overflow in the set_page_size function in util.cxx in HTMLDOC 1.8.27 and earlier allows context-dependent attackers to execute arbitrary code via a long MEDIA SIZE comment.
Note: it was later reported that there were additional vectors in htmllib.cxx and ps-pdf.cxx using an AFM font file with a long glyph name, but these vectors do not cross privilege boundaries.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.5 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.8 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: CONFIRM
Type: Exploit
http://bugs.gentoo.org/show_bug.cgi?id=278186

Source: MITRE
Type: CNA
CVE-2009-3050

Source: CCN
Type: Packet Storm Web Site
HTMLDOC versions 1.8.2 and below proof of concept buffer overflow exploit that creates a malicious .html file

Source: MISC
Type: Exploit
http://packetstormsecurity.org/0907-exploits/htmldoc-overflow.txt

Source: CCN
Type: SA35780
HTMLDOC "set_page_size()" Buffer Overflow Vulnerability

Source: SECUNIA
Type: Vendor Advisory
35780

Source: CCN
Type: GLSA-200909-12
HTMLDOC: User-assisted execution of arbitrary code

Source: CCN
Type: Easy Software Products Web site
HTMLDOC

Source: CONFIRM
Type: Exploit
http://www.htmldoc.org/str.php?L214

Source: MLIST
Type: UNKNOWN
[oss-security] 20090725 Re: CVE Request -- HTMLDOC

Source: MLIST
Type: UNKNOWN
[oss-security] 20090726 Re: CVE Request -- HTMLDOC

Source: MLIST
Type: UNKNOWN
[oss-security] 20090901 Re: CVE Request -- HTMLDOC

Source: CCN
Type: OSVDB ID: 55840
HTMLDOC htmldoc/util.cxx set_page_size() Function Overflow

Source: CCN
Type: BID-35727
HTMLDOC 'html' File Handling Remote Stack Buffer Overflow Vulnerability

Source: XF
Type: UNKNOWN
htmldoc-setpagesize-bo(51701)

Source: SUSE
Type: SUSE-SR:2009:020
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:htmldoc:htmldoc:1.8.24:*:*:*:*:*:*:*
  • OR cpe:/a:htmldoc:htmldoc:1.8.25:*:*:*:*:*:*:*
  • OR cpe:/a:htmldoc:htmldoc:1.8.26:*:*:*:*:*:*:*
  • OR cpe:/a:htmldoc:htmldoc:*:*:*:*:*:*:*:* (Version <= 1.8.27)

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20093050
    V
    CVE-2009-3050
    2022-06-30
    oval:org.opensuse.security:def:112407
    P
    htmldoc-1.8.28-2.4 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:105916
    P
    htmldoc-1.8.28-2.4 on GA media (Moderate)
    2021-10-01
    BACK
    htmldoc htmldoc 1.8.24
    htmldoc htmldoc 1.8.25
    htmldoc htmldoc 1.8.26
    htmldoc htmldoc *