Bug 865779 (CVE-2012-4512) - CVE-2012-4512 kdelibs: Heap-based buffer overflow when parsing location of a font face source
Summary: CVE-2012-4512 kdelibs: Heap-based buffer overflow when parsing location of a ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-4512
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 866228 866230
Blocks: 865878
TreeView+ depends on / blocked
 
Reported: 2012-10-12 12:35 UTC by Jan Lieskovsky
Modified: 2020-01-27 20:38 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A heap-based buffer overflow flaw was found in the way the CSS parser of the Document Object Model's (DOM) implementation of KDE libraries performed processing of a location of a particular font face source. A remote attacker with privileges could provide a specially-crafted web page that, when opened in an application linked against KDE libraries, would lead to the application crashing or potential execution of arbitrary code.
Clone Of:
Environment:
Last Closed: 2014-05-30 18:51:35 UTC
Embargoed:


Attachments (Terms of Use)
Patch that should fix this bug (990 bytes, patch)
2012-10-15 11:09 UTC, Jan Grulich
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:1416 0 normal SHIPPED_LIVE Critical: kdelibs security update 2012-10-30 21:13:41 UTC
Red Hat Product Errata RHSA-2012:1418 0 normal SHIPPED_LIVE Critical: kdelibs security update 2013-02-22 01:53:15 UTC

Description Jan Lieskovsky 2012-10-12 12:35:39 UTC
A heap-based buffer overflow flaw was found in the way CSS parser DOM implementation of KDE libraries performed parsing of a location of the source for a particular font face. A remote attacker could provide a specially-crafted web page that, when opened in an application linked against KDE libraries (such as konqueror), would lead to that application crash or, potentially, arbitrary code execution with the privileges of the user running the application.

Upstream patch:
[1] http://quickgit.kde.org/index.php?p=kdelibs.git&a=commitdiff&h=a872c8a969a8bd3706253d6ba24088e4f07f3352

References:
[2] http://www.openwall.com/lists/oss-security/2012/10/10/11
[3] http://www.openwall.com/lists/oss-security/2012/10/11/11

Comment 1 Jan Lieskovsky 2012-10-12 12:39:00 UTC
This issue did NOT affect the version of the kdelibs package, as shipped with Red Hat Enterprise Linux 5 as it did not provide a functionality for parsing location of the font face source yet.

--

This issue affects the version of the kdelibs package, as shipped with Red Hat Enterprise Linux 6.

--

This issue did NOT affect the versions of the kdelibs package, as shipped with Fedora release of 16 and 17 (as they are already updated with aforementioned upstream patch).

Comment 7 Jan Grulich 2012-10-15 11:09:07 UTC
Created attachment 627302 [details]
Patch that should fix this bug

Comment 9 Vincent Danen 2012-10-30 16:27:00 UTC
This is now public:

http://seclists.org/oss-sec/2012/q4/171

Comment 10 errata-xmlrpc 2012-10-30 17:16:12 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:1416 https://rhn.redhat.com/errata/RHSA-2012-1416.html

Comment 11 errata-xmlrpc 2012-10-30 17:36:31 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:1418 https://rhn.redhat.com/errata/RHSA-2012-1418.html


Note You need to log in before you can comment on or make changes to this bug.