[CVE-2007-5395] link-grammar is vulnerable

Bug #162511 reported by Stephan Rügamer
254
Affects Status Importance Assigned to Milestone
link-grammar (Ubuntu)
Fix Released
Low
Unassigned
Dapper
Fix Released
Low
Kees Cook
Edgy
Fix Released
Low
Kees Cook
Feisty
Fix Released
Low
Kees Cook
Gutsy
Fix Released
Low
Kees Cook
Hardy
Fix Released
Low
Unassigned

Bug Description

Binary package hint: link-grammar

Dear Colleagues,

link-grammar is vulnerable.
From CVE:

Stack-based buffer overflow in the separate_word function in tokenize.c in Link Grammar 4.1b and possibly other versions, as used in AbiWord Link Grammar 4.2.4, allows remote attackers to execute arbitrary code via a long word, as reachable through the separate_sentence function.

I'll attached some debdiffs to versions which are affected to this vulnerability.

Regards,

\sh

Revision history for this message
Stephan Rügamer (sruegamer) wrote :
Revision history for this message
Stephan Rügamer (sruegamer) wrote :
Revision history for this message
Stephan Rügamer (sruegamer) wrote :
Revision history for this message
Stephan Rügamer (sruegamer) wrote :
Revision history for this message
Kees Cook (kees) wrote :

Thanks for getting this prepared. Since this is a user-assisted attack and Edgy and newer should be stack-overflow-protected, I'm giving this a low priority. I will get it uploaded shortly. Thanks!

Changed in link-grammar:
assignee: nobody → keescook
importance: Undecided → Low
status: New → In Progress
Revision history for this message
Kees Cook (kees) wrote :

Thanks for getting these prepared. I haven't been able to reproduce a crash with "just" a 62 character word. Have you seen any proof-of-concepts for this? I've uploaded the fixes to the security queue, they should be published shortly.

Changed in link-grammar:
assignee: keescook → nobody
status: In Progress → Fix Released
assignee: nobody → keescook
importance: Undecided → Low
status: New → Fix Committed
assignee: nobody → keescook
importance: Undecided → Low
status: New → Fix Committed
assignee: nobody → keescook
importance: Undecided → Low
status: New → Fix Committed
assignee: nobody → keescook
importance: Undecided → Low
status: New → Fix Committed
Revision history for this message
Stephan Rügamer (sruegamer) wrote :

link-grammar (4.2.2-4ubuntu0.7.10.1) gutsy-security; urgency=low

  * SECURITY UPDATE: Stack-based buffer overflow in the separate_word function
    in tokenize.c in Link Grammar 4.1b and possibly other versions, as used in
    AbiWord Link Grammar 4.2.4, allows remote attackers to execute arbitrary code
    via a long word, as reachable through the separate_sentence function.
  * debian/patches/CVE-2007-5395: Added patch according to upstream.
    (See: https://bugzilla.redhat.com/attachment.cgi?id=255061)
    (LP: #162511)
  * References:
    CVE-2007-5395
    https://bugzilla.redhat.com/show_bug.cgi?id=371221

 -- Stephan Hermann <email address hidden> Tue, 13 Nov 2007 22:32:54 +0100

Revision history for this message
Stephan Rügamer (sruegamer) wrote :

link-grammar (4.2.2-4ubuntu0.7.04.1) feisty-security; urgency=low

  * SECURITY UPDATE: Stack-based buffer overflow in the separate_word function
    in tokenize.c in Link Grammar 4.1b and possibly other versions, as used in
    AbiWord Link Grammar 4.2.4, allows remote attackers to execute arbitrary code
    via a long word, as reachable through the separate_sentence function.
  * debian/patches/CVE-2007-5395: Added patch according to upstream.
    (See: https://bugzilla.redhat.com/attachment.cgi?id=255061)
    (LP: #162511)
  * References:
    CVE-2007-5395
    https://bugzilla.redhat.com/show_bug.cgi?id=371221

 -- Stephan Hermann <email address hidden> Tue, 13 Nov 2007 22:38:50 +0100

Changed in link-grammar:
status: Fix Committed → Fix Released
status: Fix Committed → Fix Released
Kees Cook (kees)
Changed in link-grammar:
status: Fix Committed → Fix Released
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.