Secunia Security Advisory - r0ut3r has discovered two vulnerabilities in Amaya, which can be exploited by malicious people to compromise a user's system.
f74a169266b7437431016d5509b72229d7afe0081178631c3e94500220886c1e
----------------------------------------------------------------------
Did you know that a change in our assessment rating, exploit code
availability, or if an updated patch is released by the vendor, is
not part of this mailing-list?
Click here to learn more:
http://secunia.com/advisories/business_solutions/
----------------------------------------------------------------------
TITLE:
Amaya Two Buffer Overflow Vulnerabilities
SECUNIA ADVISORY ID:
SA32848
VERIFY ADVISORY:
http://secunia.com/advisories/32848/
CRITICAL:
Highly critical
IMPACT:
System access
WHERE:
>From remote
SOFTWARE:
Amaya 10.x
http://secunia.com/advisories/product/20580/
DESCRIPTION:
r0ut3r has discovered two vulnerabilities in Amaya, which can be
exploited by malicious people to compromise a user's system.
1) A boundary error when processing "<div>" HTML tags can be
exploited to cause a stack-based buffer overflow via an overly long
"id" parameter.
2) A boundary error exists when processing overly long links. This
can be exploited to cause a stack-based buffer overflow by tricking
the user into e.g. editing a malicious link.
Successful exploitation of the vulnerabilities allows execution of
arbitrary code.
The vulnerabilities are confirmed in version 10.0.1 for Windows.
Other versions may also be affected.
SOLUTION:
Do not follow untrusted links or browse untrusted websites.
PROVIDED AND/OR DISCOVERED BY:
r0ut3r
ORIGINAL ADVISORY:
http://www.bmgsec.com.au/advisory/41/
http://www.bmgsec.com.au/advisory/40/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------