{"id":"CVE-2009-3050","details":"Buffer overflow in the set_page_size function in util.cxx in HTMLDOC 1.8.27 and earlier allows context-dependent attackers to execute arbitrary code via a long MEDIA SIZE comment.  NOTE: it was later reported that there were additional vectors in htmllib.cxx and ps-pdf.cxx using an AFM font file with a long glyph name, but these vectors do not cross privilege boundaries.","modified":"2026-04-10T03:40:53.217779Z","published":"2009-09-02T17:30:01Z","related":["openSUSE-SU-2024:10463-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/35780"},{"type":"EVIDENCE","url":"http://bugs.gentoo.org/show_bug.cgi?id=278186"},{"type":"EVIDENCE","url":"http://packetstormsecurity.org/0907-exploits/htmldoc-overflow.txt"},{"type":"EVIDENCE","url":"http://www.htmldoc.org/str.php?L214"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2009/07/25/3"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2009/07/26/2"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2009/09/01/1"}],"schema_version":"1.7.5"}