[ASA-202106-13] zint: arbitrary code execution
Jonas Witschel
diabonas at archlinux.org
Thu Jun 3 08:44:08 UTC 2021
Arch Linux Security Advisory ASA-202106-13
==========================================
Severity: Medium
Date : 2021-06-01
CVE-ID : CVE-2021-27799
Package : zint
Type : arbitrary code execution
Remote : No
Link : https://security.archlinux.org/AVG-1625
Summary
=======
The package zint before version 2.9.1-2 is vulnerable to arbitrary code
execution.
Resolution
==========
Upgrade to 2.9.1-2.
# pacman -Syu "zint>=2.9.1-2"
The problem has been fixed upstream but no release is available yet.
Workaround
==========
None.
Description
===========
ean_leading_zeroes in backend/upcean.c in Zint Barcode Generator 2.9.1
has a stack-based buffer overflow that is reachable from the C API
through an application that includes the Zint Barcode Generator library
code.
Impact
======
An attacker could execute arbitrary code by supplying crafted input to
generate an EAN barcode.
References
==========
https://bugs.archlinux.org/task/70051
https://sourceforge.net/p/zint/tickets/218/
https://sourceforge.net/p/zint/code/ci/7f8c8114f31c09a986597e0ba63a49f96150368a/
https://security.archlinux.org/CVE-2021-27799
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20210603/7ac1da6c/attachment.sig>
More information about the arch-security
mailing list