Multiple stack-based buffer overflows in the word-list-compress functionality in compress.c for Aspell allow local users to execute arbitrary code via a long entry in the wordlist that is not properly handled when using the (1) "c" compress option or (2) "d" decompress option.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gnu aspell 0.50.5 |
||
gentoo linux 1.4 |