Anon Sricharoenchai wrote:
> Package: mimms
> Version: 0.0.9-1
> Severity: grave
> Justification: user security hole
> Tags: security patch
>
> According to the patch attached in this report, it has many possible buffer
> overflows.
> For example,
> - memcpy(buf, data, length) without bounding the limit of "length",
> while "length" depend on the input data incoming from the internet.
> - read(s, data, BUF_SIZE) in main(), where BUF_SIZE is much greater than
> sizeof(data) which is only 1024 chars allocated in main(), while
> BUF_SIZE is defined as 1024*128.
Woha! Good work Anon! I'm impressed. I've assigned CVE-2006-2200 to
these issues.
One question remains, though:
> + // buf_size = min(count, buf_size);
> + if (buf_size > count) buf_size = count;
Is there any reason not to write mim() here?
Regards,
Joey
--
Given enough thrust pigs will fly, but it's not necessarily a good idea.
Please always Cc to me when replying to me on the lists.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]