Source: catdoc Version: 1:0.95-5 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org> Control: found -1 1:0.95-4.1
Hi, The following vulnerabilities were published for catdoc. CVE-2024-48877[0]: | A memory corruption vulnerability exists in the Shared String Table | Record Parser implementation in xls2csv utility version 0.95. A | specially crafted malformed file can lead to a heap buffer overflow. | An attacker can provide a malicious file to trigger this | vulnerability. CVE-2024-52035[1]: | An integer overflow vulnerability exists in the OLE Document File | Allocation Table Parser functionality of catdoc 0.95. A specially | crafted malformed file can lead to heap-based memory corruption. An | attacker can provide a malicious file to trigger this vulnerability. CVE-2024-54028[2]: | An integer underflow vulnerability exists in the OLE Document DIFAT | Parser functionality of catdoc 0.95. A specially crafted malformed | file can lead to heap-based memory corruption. An attacker can | provide a malicious file to trigger this vulnerability. If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-48877 https://www.cve.org/CVERecord?id=CVE-2024-48877 [1] https://security-tracker.debian.org/tracker/CVE-2024-52035 https://www.cve.org/CVERecord?id=CVE-2024-52035 [2] https://security-tracker.debian.org/tracker/CVE-2024-54028 https://www.cve.org/CVERecord?id=CVE-2024-54028 Regards, Salvatore