FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

CVE-2009-0323

This CVE name corresponds to:

Entered Topic
2009-02-09 amaya -- multiple buffer overflow vulnerabilities

The following information is adapted from the Common Vulnerabilities and Exposures (CVE) project. CVE and the CVE logo are trademarks of The MITRE Corporation. CVE content is Copyright 2005, The MITRE Corporation.

Details

Type Candidate
Name CVE-2009-0323
Phase Assigned(20090128)

Description

Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0 and 11.0 allow remote attackers to execute arbitrary code via (1) a long type parameter in an input tag, which is not properly handled by the EndOfXmlAttributeValue function; (2) an "HTML GI" in a start tag, which is not properly handled by the ProcessStartGI function; and unspecified vectors in (3) html2thot.c and (4) xml2thot.c, related to the msgBuffer variable. NOTE: these are different vectors than CVE-2008-6005.

References

Source Reference
BUGTRAQ 20090128 CORE-2008-1211: Amaya web editor XML and HTML parser vulnerabilities
MILW0RM 7902
MISC http://www.coresecurity.com/content/amaya-buffer-overflows
XF amaya-html-tags-bo(48325)