A stack-based buffer overflow in image_load_bmp() in HTMLDOC <= 1.9.13 results in remote code execution if the victim converts an HTML document linking to a crafted BMP file.
References
Link | Resource |
---|---|
https://github.com/michaelrsweet/htmldoc/issues/453 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/michaelrsweet/htmldoc/compare/v1.9.12...v1.9.13 | Release Notes Third Party Advisory |
https://github.com/michaelrsweet/htmldoc/commit/27d08989a5a567155d506ac870ae7d8cc88fa58b | Patch Third Party Advisory |
https://github.com/michaelrsweet/htmldoc/issues/456 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/02/msg00022.html | Mailing List Third Party Advisory |
Information
Published : 2022-01-10 06:10
Updated : 2022-04-01 08:20
NVD link : CVE-2021-43579
Mitre link : CVE-2021-43579
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
debian
- debian_linux
htmldoc_project
- htmldoc