### [CVE-2009-3050](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3050) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Buffer overflow in the set_page_size function in util.cxx in HTMLDOC 1.8.27 and earlier allows context-dependent attackers to execute arbitrary code via a long MEDIA SIZE comment. NOTE: it was later reported that there were additional vectors in htmllib.cxx and ps-pdf.cxx using an AFM font file with a long glyph name, but these vectors do not cross privilege boundaries. ### POC #### Reference - http://bugs.gentoo.org/show_bug.cgi?id=278186 - http://bugs.gentoo.org/show_bug.cgi?id=278186 - http://packetstormsecurity.org/0907-exploits/htmldoc-overflow.txt - http://packetstormsecurity.org/0907-exploits/htmldoc-overflow.txt - http://www.openwall.com/lists/oss-security/2009/07/25/3 - http://www.openwall.com/lists/oss-security/2009/07/25/3 #### Github - https://github.com/mudongliang/LinuxFlaw - https://github.com/oneoy/cve-