Source: pev X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security
Hi, The following vulnerability was published for pev. CVE-2021-45423[0]: | A Buffer Overflow vulnerabilityexists in Pev 0.81 via the pe_exports | function from exports.c.. The array offsets_to_Names is dynamically | allocated on the stack using exp->NumberOfFunctions as its size. | However, the loop uses exp->NumberOfNames to iterate over it and | set its components value. Therefore, the loop code assumes that | exp->NumberOfFunctions is greater than ordinal at each iteration. | This can lead to arbitrary code execution. https://github.com/merces/libpe/issues/35 https://github.com/merces/libpe/commit/9b5fedc37ccbcd23695a0e97c0fe46c999e26100 https://github.com/merces/libpe/commit/8960f7d710c4d1a43badd2bbf273721248b864f8 If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2021-45423 https://www.cve.org/CVERecord?id=CVE-2021-45423 Please adjust the affected versions in the BTS as needed.