GLSA-200407-11 : wv: Buffer overflow vulnerability

critical Nessus Plugin ID 14544

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200407-11 (wv: Buffer overflow vulnerability)

A use of strcat without proper bounds checking leads to an exploitable buffer overflow. The vulnerable code is executed when wv encounters an unrecognized token, so a specially crafted file, loaded in wv, can trigger the vulnerable code and execute its own arbitrary code. This exploit is only possible when the user loads the document into HTML view mode.
Impact :

By inducing a user into running wv on a special file, an attacker can execute arbitrary code with the permissions of the user running the vulnerable program.
Workaround :

Users should not view untrusted documents with wvHtml or applications using wv. When loading an untrusted document in an application using the wv library, make sure HTML view is disabled.

Solution

All users should upgrade to the latest available version.
# emerge sync # emerge -pv '>=app-text/wv-1.0.0-r1' # emerge '>=app-text/wv-1.0.0-r1'

See Also

http://www.nessus.org/u?7cf1d63b

https://security.gentoo.org/glsa/200407-11

Plugin Details

Severity: Critical

ID: 14544

File Name: gentoo_GLSA-200407-11.nasl

Version: 1.22

Type: local

Published: 8/30/2004

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:wv, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 7/14/2004

Vulnerability Publication Date: 7/9/2004

Reference Information

CVE: CVE-2004-0645

GLSA: 200407-11