Your message dated Sat, 27 Jan 2007 20:32:02 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#408603: fixed in chmlib 2:0.39-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: libchm1
Version: 0.380-2
Severity: grave
Tags: security

Please upgrade to the new upstream version, or backport the changes.
Don't forget to check if stable is affected as well.  Thanks.

From: iDefense Labs <[EMAIL PROTECTED]>
Subject: [VulnWatch] iDefense Security Advisory 01.26.07: Multiple Vendor 
libchm Page
 Block Length Memory Corruption Vulnerability
To:  [EMAIL PROTECTED],  full-disclosure@lists.grok.org.uk,  
bugtraq@securityfocus.com
Date: Fri, 26 Jan 2007 15:01:15 -0500
Message-ID: <[EMAIL PROTECTED]>

Multiple Vendor libchm Page Block Length Memory Corruption Vulnerability

iDefense Security Advisory 01.26.07
http://labs.idefense.com/intelligence/vulnerabilities/
Jan 26, 2007

I. BACKGROUND

CHMlib is an open source library used to read Microsoft CHM, compressed
HTML, files. CHM files were originally designed for use by Microsoft as
help files, but are now commonly used to store e-books. The 'xchm' program
uses CHMlib to display CHM files. More information can be found on the
package's website:

http://www.jedrea.com/chmlib/

II. DESCRIPTION

CHM files contain various tables and objects stored in "pages." When
parsing a page of objects, CHMlib passes an unsanitized value from the file
to the alloca() function. This allows an attacker to shift the stack
pointer to point to arbitrary locations in memory. Consequently it is
possible to write arbitrary data from the file to arbitrary memory
locations.

III. ANALYSIS

Successful exploitation of this vulnerability allows an attacker to execute
arbitrary code with the permissions of the user viewing the file. An
attacker would have to first convince the user to view the CHM file
through some type of social engineering.

IV. DETECTION

iDefense has confirmed the existence of this vulnerability in CHMlib
version 0.38.

V. WORKAROUND

iDefense is currently unaware of any workarounds for this issue.

VI. VENDOR RESPONSE

The CHMlib maintainer has addressed this issue in version 0.39.

VII. CVE INFORMATION

A Mitre Corp. Common Vulnerabilities and Exposures (CVE) number has not
been assigned yet.

VIII. DISCLOSURE TIMELINE

01/24/2007  Initial vendor notification
01/24/2007  Initial vendor response
01/26/2007  Coordinated public disclosure

IX. CREDIT

Sean Larsson (iDefense Labs) is credited with the discovery of this
vulnerability.

Get paid for vulnerability research
http://labs.idefense.com/methodology/vulnerability/vcp.php

Free tools, research and upcoming events
http://labs.idefense.com/

X. LEGAL NOTICES

Copyright © 2006 iDefense, Inc.

Permission is granted for the redistribution of this alert electronically.
It may not be edited in any way without the express written consent of
iDefense. If you wish to reprint the whole or any part of this alert in
any other medium other than electronically, please e-mail
[EMAIL PROTECTED] for permission.

Disclaimer: The information in the advisory is believed to be accurate at
the time of publishing based on currently available information. Use of
the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on, this
information.




--- End Message ---
--- Begin Message ---
Source: chmlib
Source-Version: 2:0.39-1

We believe that the bug you reported is fixed in the latest version of
chmlib, which is due to be installed in the Debian FTP archive:

chmlib_0.39-1.diff.gz
  to pool/main/c/chmlib/chmlib_0.39-1.diff.gz
chmlib_0.39-1.dsc
  to pool/main/c/chmlib/chmlib_0.39-1.dsc
chmlib_0.39.orig.tar.gz
  to pool/main/c/chmlib/chmlib_0.39.orig.tar.gz
libchm-bin_0.39-1_amd64.deb
  to pool/main/c/chmlib/libchm-bin_0.39-1_amd64.deb
libchm-dev_0.39-1_amd64.deb
  to pool/main/c/chmlib/libchm-dev_0.39-1_amd64.deb
libchm1_0.39-1_amd64.deb
  to pool/main/c/chmlib/libchm1_0.39-1_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Julien Lemoine <[EMAIL PROTECTED]> (supplier of updated chmlib package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sat, 27 Jan 2007 21:00:41 +0100
Source: chmlib
Binary: libchm-dev libchm-bin libchm1
Architecture: source amd64
Version: 2:0.39-1
Distribution: unstable
Urgency: high
Maintainer: Julien Lemoine <[EMAIL PROTECTED]>
Changed-By: Julien Lemoine <[EMAIL PROTECTED]>
Description: 
 libchm-bin - library for dealing with Microsoft CHM format files
 libchm-dev - library for dealing with Microsoft CHM format files
 libchm1    - library for dealing with Microsoft CHM format files
Closes: 408603
Changes: 
 chmlib (2:0.39-1) unstable; urgency=high
 .
   * New upstream release, fixed unsafe alloca() call (Closes: #408603)
Files: 
 e2eeff8a124d0b7260b5f78ccc433b9b 609 libs optional chmlib_0.39-1.dsc
 895db85bb48bae4c483c3e4675939c80 358247 libs optional chmlib_0.39.orig.tar.gz
 3bd8ce5e42cebf53ce47b84cc233e3f7 5187 libs optional chmlib_0.39-1.diff.gz
 fa0230f9ea16e8da84caadcb72ec1e96 26216 libs optional libchm1_0.39-1_amd64.deb
 9e079c0eceff118f2cef68f5f74ba62f 17572 libdevel optional 
libchm-bin_0.39-1_amd64.deb
 d78f095ee56752a76eb5984c3a4d96dd 24286 libdevel optional 
libchm-dev_0.39-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFu7Kzc29c8N2YKnURAkozAKCehf8DxYUfrWZLXYdgWAADOwc/bwCeOMbV
Fm5Q/7sE4BzJCCjtPQni+v8=
=lN5A
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to