Vilistextum: Buffer overflow vulnerability Vilistextum is vulnerable to a buffer overflow that allows an attacker to execute arbitrary code through the use of a malicious webpage. vilistextum 2005-01-06 2005-01-06 74694 remote 2.6.7 2.6.7

Vilistextum is an HTML to text converter.

Ariel Berkman discovered that Vilistextum unsafely reads data into an array without checking the length. This code vulnerability may lead to a buffer overflow.

A remote attacker could craft a malicious webpage which, when converted, would result in the execution of arbitrary code with the rights of the user running Vilistextum.

There is no known workaround at this time.

All Vilistextum users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=app-text/vilistextum-2.6.7"
Original Advisory CAN-2004-1299 koon koon SeJo