Gentoo Logo

Common Data Format library: User-assisted execution of arbitrary code

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200805-14 / cdf
Release Date May 13, 2008
Latest Revision May 13, 2008: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
sci-libs/cdf < 3.2.1 >= 3.2.1 All supported architectures

Related bugreports: #220391

Synopsis

A buffer overflow vulnerability has been discovered in the Common Data Format library.

2.  Impact Information

Background

The Common Data Format library is a scientific data management package which allows programmers and application developers to manage and manipulate scalar, vector, and multi-dimensional data arrays in a platform independent fashion.

Description

Alfredo Ortega (Core Security Technologies) reported a boundary error within the Read32s_64() function when processing CDF files.

Impact

A remote attacker could entice a user to open a specially crafted CDF file, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the application.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All Common Data Format library users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=sci-libs/cdf-3.2.1"

4.  References



Print

Page updated May 13, 2008

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.