Description
Multiple buffer overflows in the (1) write_heading function in subs.cpp or (2) trim_title function in parse.cpp for abctab2ps 1.6.3 allow remote attackers to execute arbitrary code via crafted ABC files.
Exploits (2)
exploitdb
WRITEUP
VERIFIED
by Limin Wang · textremotewindows
https://www.exploit-db.com/exploits/25027
exploitdb
WRITEUP
VERIFIED
by Limin Wang · textremotewindows
https://www.exploit-db.com/exploits/25029
References (3)
Core 3
Core References
Exploit, Vendor Advisory x_refsource_misc
http://tigger.uic.edu/~jlongs2/holes/abctab2ps.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/18583
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/18584
Scores
EPSS
0.1019
EPSS Percentile
93.2%
Details
Status
published
Products (1)
abctab2ps/abctab2ps
1.6.3
Published
Jan 10, 2005
Tracked Since
Feb 18, 2026