Vulnerabilities > CVE-2009-2294 - Numeric Errors vulnerability in Dillo
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Integer overflow in the Png_datainfo_callback function in Dillo 2.1 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG image with crafted (1) width or (2) height values.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200908-10.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200908-10 (Dillo: User-assisted execution of arbitrary code) Tilei Wang reported an integer overflow in the Png_datainfo_callback() function, possibly leading to a heap-based buffer overflow. Impact : A remote attacker could entice a user to open an HTML document containing a specially crafted, large PNG image, possibly resulting in the execution of arbitrary code with the privileges of the user running the application. Workaround : There is no known workaround at this time. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 40635 |
published | 2009-08-20 |
reporter | This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/40635 |
title | GLSA-200908-10 : Dillo: User-assisted execution of arbitrary code |
code |
|
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 35575 CVE(CAN) ID: CVE-2009-2294 Dillo是运行在Unix平台上的轻量级浏览器。 Dillo的Png_datainfo_callback函数在解析内嵌了PNG图形的HTML页面时存在可最终导致堆溢出的整数溢出漏洞。如果攻击者在PNG图形中指定了超长的宽度和高度值,打开该图形就可以触发这个溢出,导致执行任意代码。 Dillo Project Dillo <= 2.1 厂商补丁: Dillo Project ------------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://www.dillo.org/download/dillo-2.1.1.tar.bz2 |
id | SSV:11765 |
last seen | 2017-11-19 |
modified | 2009-07-07 |
published | 2009-07-07 |
reporter | Root |
title | Dillo Png_datainfo_callback()函数整数溢出漏洞 |