Mandriva Linux Security Advisory 2009-231 - Buffer overflow in the set_page_size function in util.cxx in HTMLDOC 1.8.27 and earlier allows context-dependent attackers to execute arbitrary code via a long MEDIA SIZE comment. NOTE: it was later reported that there were additional vectors in htmllib.cxx and ps-pdf.cxx using an AFM font file with a long glyph name, but these vectors do not cross privilege boundaries. This update provides a solution to this vulnerability. Packages for 2008.0 are being provided due to extended support for Corporate products.
46bd77ac0612076ebb444b89c640113804b453e302b1ce9becfa60c6c7728da6
Gentoo Linux Security Advisory GLSA 200909-12 - Multiple insecure calls to the sscanf() function in HTMLDOC might result in the execution of arbitrary code. ANTHRAX666 reported an insecure call to the sscanf() function in the set_page_size() function in htmldoc/util.cxx. Nico Golde of the Debian Security Team found two more insecure calls in the write_type1() function in htmldoc/ps-pdf.cxx and the htmlLoadFontWidths() function in htmldoc/htmllib.cxx. Versions less than 1.8.27-r1 are affected.
880ab8ed72c53b68d1cb6961bd59140a3c52d0b87c9ae0304b7b6397ae2f4721
Mandriva Linux Security Advisory 2009-231 - Buffer overflow in the set_page_size function in util.cxx in HTMLDOC 1.8.27 and earlier allows context-dependent attackers to execute arbitrary code via a long MEDIA SIZE comment. NOTE: it was later reported that there were additional vectors in htmllib.cxx and ps-pdf.cxx using an AFM font file with a long glyph name, but these vectors do not cross privilege boundaries. This update provides a solution to this vulnerability.
1465772bf9a9ab6076220912dfcb7f48b2c4d4a7aba914839979e69e39b5b539