Multiple vulnerabilities in Kazehakase could result in the execution of arbitrary code.
Package | www-client/kazehakase on all architectures |
---|---|
Affected versions | < 0.5.0 |
Unaffected versions | >= 0.5.0 |
Kazehakase is a web browser based on the Gecko engine.
Kazehakase includes a copy of PCRE which is vulnerable to multiple buffer overflows and memory corruptions vulnerabilities (GLSA 200711-30).
A remote attacker could entice a user to open specially crafted input (e.g bookmarks) with Kazehakase, which could possibly lead to the execution of arbitrary code, a Denial of Service or the disclosure of sensitive information.
There is no known workaround at this time.
All Kazehakase users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/kazehakase-0.5.0"
Release date
January 30, 2008
Latest revision
January 30, 2008: 01
Severity
normal
Exploitable
remote
Bugzilla entries