A stack-based buffer overflow in imageloadbmp() in HTMLDOC <= 1.9.13 results in remote code execution if the victim converts an HTML document linking to a crafted BMP file.
[ { "signature_type": "Line", "deprecated": false, "source": "https://github.com/michaelrsweet/htmldoc/commit/27d08989a5a567155d506ac870ae7d8cc88fa58b", "signature_version": "v1", "target": { "file": "htmldoc/image.cxx" }, "digest": { "threshold": 0.9, "line_hashes": [ "75444419729333380443052050884245593707", "52953918717421753729251150082072149909", "152886919627866368274563169380254036118", "198152111810803722130400047947566870774", "304108754680799189403228624423602673270", "157781778164509291172586315901535516558", "70669642789662802104105858184899219014", "168806463103019594349885454995563723793" ] }, "id": "CVE-2021-43579-3dcf72e3" }, { "signature_type": "Function", "deprecated": false, "source": "https://github.com/michaelrsweet/htmldoc/commit/27d08989a5a567155d506ac870ae7d8cc88fa58b", "signature_version": "v1", "target": { "function": "image_load_bmp", "file": "htmldoc/image.cxx" }, "digest": { "function_hash": "79376633260742945387846236869644820982", "length": 4321.0 }, "id": "CVE-2021-43579-8b2b6b1d" } ]