Package: abiword
Version: 2.2.9
Severity: important

Attached is a security patch for AbiWord that fix a buffer overflow
allowing to execute arbitrary code when importing a bogus RTF file.

Patch is already in upstream CVS, but I recommend to apply it for stable.

Thanks.

Hub
-- 
http://www.figuiere.net/hub/blog/
Index: src/wp/impexp/xp/ie_imp_RTF.cpp
===================================================================
RCS file: /cvsroot/abi/src/wp/impexp/xp/ie_imp_RTF.cpp,v
retrieving revision 1.347.2.18
retrieving revision 1.347.2.19
diff -u -p -u -r1.347.2.18 -r1.347.2.19
--- src/wp/impexp/xp/ie_imp_RTF.cpp	27 Jul 2005 15:20:30 -0000	1.347.2.18
+++ src/wp/impexp/xp/ie_imp_RTF.cpp	23 Sep 2005 16:37:41 -0000	1.347.2.19
@@ -7937,9 +7937,10 @@ bool IE_Imp_RTF::ReadOneFontFromTable(bo
 	    FIXME: CJK font names come in form \'aa\'cd\'ef - so we have to
 	    parse \'HH correctly (currently we ignore them!) - VH
 	*/
-	while ( ch != '}'  &&  ch != '\\'  &&  ch != ';' && ch!= '{')
+	while ( ch != '}'  &&  ch != '\\'  &&  ch != ';' && ch!= '{' && count < MAX_KEYWORD_LEN)
 	{
-		keyword[count++] = ch;
+		keyword[count] = ch;
+		count++;
 		if (!ReadCharFromFile(&ch))
 		{
 			return false;

Reply via email to