Notepad++ RB file buffer overflow

notepadplus-rb-bo (34269) The risk level is classified as HighHigh Risk

Description:

Notepad++ is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the SciLexer module when processing RB ruby source files. By creating a specially-crafted .RB file, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash, if the attacker could persuade the victim to open the malicious file.

*CVSS:

Base Score: 5.6
  Access Vector: Remote
  Access Complexity: High
  Authentication: Not Required
  Confidentiality Impact: Partial
  Integrity Impact: Partial
  Availability Impact: Partial
 
Temporal Score: 5.1
  Exploitability: Functional
  Remediation Level: Unavailable
  Report Confidence: Uncorroborated

Consequences:

Gain Access

Remedy:

Upgrade to the latest version of Notepad++ (4.1.2 or later), available from the Notepad++ Web site. See References.

References:

  • BugTraq Mailing List, Sat May 12 2007 - 21:22:54 CDT : notepad++[v4.1]: (win32) ruby file processing buffer overflow exploit..
  • Notepad++ Web site: .:: NOTEPAD++ ::..
  • BID-23961: Notepad++ Ruby Source File Processing Buffer Overflow Vulnerability
  • CVE-2007-2666: Stack-based buffer overflow in LexRuby.cxx (SciLexer.dll) in Scintilla 1.73, as used by notepad++ 4.1.1 and earlier, allows user-assisted remote attackers to execute arbitrary code via certain Ruby (.rb) files with long lines. NOTE: this was originally reported as a vulnerability in notepad++.
  • OSVDB ID: 36007: Scintilla LexRuby.cxx (SciLexer.dll) rb File Handling Overflow
  • SA25245: Notepad++ Ruby Source File Buffer Overflow Vulnerability
  • SA25327: Scintilla LexRuby.cxx Ruby Source File Buffer Overflow Vulnerability

Platforms Affected:

  • Don Ho Notepad++ 3.9
  • Don Ho Notepad++ 4.1
  • Don Ho Notepad++ 4.1.1

Reported:

May 12, 2007

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page