Source: pev
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for pev.

CVE-2021-45423[0]:
| A Buffer Overflow vulnerabilityexists in Pev 0.81 via the pe_exports
| function from exports.c.. The array offsets_to_Names is dynamically
| allocated on the stack using exp->NumberOfFunctions as its size.
| However, the loop uses exp->NumberOfNames to iterate over it and
| set its components value. Therefore, the loop code assumes that
| exp->NumberOfFunctions is greater than ordinal at each iteration.
| This can lead to arbitrary code execution.

https://github.com/merces/libpe/issues/35
https://github.com/merces/libpe/commit/9b5fedc37ccbcd23695a0e97c0fe46c999e26100
https://github.com/merces/libpe/commit/8960f7d710c4d1a43badd2bbf273721248b864f8


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-45423
    https://www.cve.org/CVERecord?id=CVE-2021-45423

Please adjust the affected versions in the BTS as needed.

Reply via email to