Vulnerabilities > CVE-2004-0548 - Stack Buffer Overflow vulnerability in GNU Aspell

047910
CVSS 7.2 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
low complexity
gnu
gentoo
nessus
exploit available

Summary

Multiple stack-based buffer overflows in the word-list-compress functionality in compress.c for Aspell allow local users to execute arbitrary code via a long entry in the wordlist that is not properly handled when using the (1) "c" compress option or (2) "d" decompress option.

Vulnerable Configurations

Part Description Count
Application
Gnu
1
OS
Gentoo
1

Exploit-Db

descriptionAspell (word-list-compress) Command Line Stack Overflow. CVE-2004-0548. Local exploit for linux platform
idEDB-ID:669
last seen2016-01-31
modified2004-12-01
published2004-12-01
reporterc0d3r
sourcehttps://www.exploit-db.com/download/669/
titleAspell word-list-compress Command Line Stack Overflow

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200406-14.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200406-14 (aspell: Buffer overflow in word-list-compress) aspell includes a utility for handling wordlists called word-list-compress. This utility fails to do proper bounds checking when processing words longer than 256 bytes. Impact : If an attacker could entice a user to handle a wordlist containing very long word lengths it could result in the execution of arbitrary code with the permissions of the user running the program. Workaround : There is no known workaround at this time. All users are encouraged to upgrade to the latest available version.
    last seen2020-06-01
    modified2020-06-02
    plugin id14525
    published2004-08-30
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/14525
    titleGLSA-200406-14 : aspell: Buffer overflow in word-list-compress
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2004-153.NASL
    descriptionA vulnerability was discovered in the aspell word-list-compress utility that can allow an attacker to execute arbitrary code. The updated packages have been patched to correct this problem.
    last seen2020-06-01
    modified2020-06-02
    plugin id16015
    published2004-12-21
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/16015
    titleMandrake Linux Security Advisory : aspell (MDKSA-2004:153)