BugTraq
Re: Riched20.DLL attribute label buffer overflow vulnerability Feb 18 2003 08:36AM
3APA3A (3APA3A SECURITY NNOV RU)
Dear Jie Dong,

Can't reproduce it on riched20.dll v.3.0 (5.30.23.1200) under NT.

--Sunday, February 16, 2003, 4:30:50 PM, you wrote to bugtraq (at) securityfocus (dot) com [email concealed]:

JD> The following RTFfile may result in illegal operation :
JD> {\rtf1\ansi\ansicpg936\deff0\deflang1033\deflangfe2052{\fonttbl{\f0
JD> \fnil\fprq2\fcharset134 \'cb\'ce\'cc\'e5;}} {\colortbl
JD> ;\red255\green0\blue255;} \viewkind4\uc1\pard\cf1\kerning2\f0
JD> \fs18121111111111111111111111111111111110000
JD> www.yoursft.com\fs20\par } "\fs" was used for setting the size of

--
~/ZARAZA
×åëîâåê ýòî òàéíà... ÿ çàíèìàþñü ýòîé òàéíîé ÷òîáû áûòü ÷åëîâåêîì. (Äîñòîåâñêèé)

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus