A stack-based buffer overflow in imageloadbmp() in HTMLDOC <= 1.9.13 results in remote code execution if the victim converts an HTML document linking to a crafted BMP file.
[
{
"digest": {
"line_hashes": [
"75444419729333380443052050884245593707",
"52953918717421753729251150082072149909",
"152886919627866368274563169380254036118",
"198152111810803722130400047947566870774",
"304108754680799189403228624423602673270",
"157781778164509291172586315901535516558",
"70669642789662802104105858184899219014",
"168806463103019594349885454995563723793"
],
"threshold": 0.9
},
"source": "https://github.com/michaelrsweet/htmldoc/commit/27d08989a5a567155d506ac870ae7d8cc88fa58b",
"deprecated": false,
"id": "CVE-2021-43579-3dcf72e3",
"signature_version": "v1",
"target": {
"file": "htmldoc/image.cxx"
},
"signature_type": "Line"
},
{
"digest": {
"length": 4321.0,
"function_hash": "79376633260742945387846236869644820982"
},
"source": "https://github.com/michaelrsweet/htmldoc/commit/27d08989a5a567155d506ac870ae7d8cc88fa58b",
"deprecated": false,
"id": "CVE-2021-43579-8b2b6b1d",
"signature_version": "v1",
"target": {
"function": "image_load_bmp",
"file": "htmldoc/image.cxx"
},
"signature_type": "Function"
}
]