rtf2latex2e reader.c 缓冲区溢出漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1108363 漏洞类型 缓冲区溢出
发布时间 2004-12-16 更新时间 2005-01-10
CVE编号 CVE-2004-1293 CNNVD-ID CNNVD-200501-131
漏洞平台 Linux CVSS评分 10.0
|漏洞来源
https://www.exploit-db.com/exploits/25006
https://www.securityfocus.com/bid/82590
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200501-131
|漏洞详情
rtf2latex2e是一个将RTF文件转换为LaTeX文件的转换器程序。rtf2latex2e1.0fc2版本中reader.c的ReadFontTbl函数存在缓冲区溢出漏洞。远程攻击者使用特别构造的RTF文件,利用此漏洞执行任意代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/11994/info

It is reported that rtf2latex2e is susceptible to a stack buffer overflow vulnerability. This issue is due to a failure of the application to properly bounds check user-supplied image data prior to copying it into a fixed-size memory buffer.

This vulnerability allows remote attackers to alter the proper flow of execution of the application, potentially resulting in the execution of attacker-supplied machine code in the context of the application attempting to read the malicious RTF file. 

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25006.zip
|受影响的产品
rtf2latex2e rtf2latex2e 1.0 Fc2
|参考资料

来源:XF
名称:rtf2latex2e-reader-bo(18559)
链接:http://xforce.iss.net/xforce/xfdb/18559
来源:MISC
链接:http://tigger.uic.edu/~jlongs2/holes/rtf2latex2e.txt