title: openMosix userspace library stack-based buffer overflow

Discovered by: Jose Carlos Norte


There are a lot of buffer overflows present in the library of the openMosix 
project, documented at: 


http://www.openmosixview.com/docs/openMosixAPI.html


The vulnerable code is in:


http://openmosix.cvs.sourceforge.net/openmosix/userspace-tools/moslib/libmosix.c?revision=1.6&view=markup


134 int64_t

135 msx_readnode(int node, const char *item)

136 {

137 char fn[40];

138 int64_t val;

139

140 if(!node && !(node = msx_read("/proc/hpc/admin/mospe")))

141 return(-1);

142 sprintf(fn, "/proc/hpc/nodes/%d/%s", node, item); 


in line 142 there is no check against overflow in "item" argument.


Every applications using this library, can be vulnerable to attacks exploiting 
this flaw.


Reply via email to