A stack-based buffer overflow in image_load_bmp() in HTMLDOC <= 1.9.13 results in remote code execution if the victim converts an HTML document linking to a crafted BMP file.
References
Link | Resource |
---|---|
https://github.com/michaelrsweet/htmldoc/commit/27d08989a5a567155d506ac870ae7d8cc88fa58b | Patch Third Party Advisory |
https://github.com/michaelrsweet/htmldoc/compare/v1.9.12...v1.9.13 | Release Notes Third Party Advisory |
https://github.com/michaelrsweet/htmldoc/issues/453 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/michaelrsweet/htmldoc/issues/456 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/02/msg00022.html | Mailing List Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-11-12T17:49:37
Updated: 2022-02-26T13:06:15
Reserved: 2021-11-12T00:00:00
Link: CVE-2021-43579
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-01-10T14:10:24.167
Modified: 2022-04-01T15:20:58.410
Link: CVE-2021-43579
JSON object: View
Redhat Information
No data.
CWE