On Wed, Apr 04, 2007 at 08:04:52PM +0300, Eddy Petri\u0219or wrote:
> > I tagged this bug as grave+security because it can be used to make
> > elinks load any corrupted file, and possibly execute arbitrary code.
> How? Those are only strings. Nothing is executed from po/mo/gmo files.
Beside the segfault that could potentially be exploited, as it was
already answered by Steve Langasek, I can see another attack vector.
Since the attacker has the full control of the gettext catalog, I
suspect that some sort of format string attack could be doable (I
haven't tried).
Arnaud
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]