Dear LICQ developers,
    I found something while looking at CVE-2002-0251 for any involvement of
a string format vulnerability (the CVE text hints at it, even though your
patch for the issue fixed a buffer overflow instead).

In the file icqpacket.cpp, line 1253, there's a call to snprintf where a
variable string, szState, occuppies the position of the format string.  Data
for this string seems to be coming from the network (c.f. code in
icqd-udp.cpp, CICQDaemon::ProcessMetaCommand for the case
META_GENERALxINFO).

It is still present in the most recent version of licq using anonymous cvs
access.

As I am writing a paper on the use of source code auditors to find
vulnerabilities, I would appreciate being able to reference this
vulnerability.  The submission deadline for the paper is only a couple of
days;  however, the paper would be only distributed to a few responsible
reviewers, and wouldn't be published until October, if accepted.  Would you
mind?

Thanks,
Pascal Meunier, Ph.D., M.Sc., CISSP
Assistant Research Scientist
Purdue University CERIAS
Recitation Building
656 Oval Drive
West Lafayette, IN 47907-2039

+1 (765) 494-7841 (main)
http://www.cerias.purdue.edu/




-------------------------------------------------------
This SF.net email is sponsored by: eBay
Get office equipment for less on eBay!
http://adfarm.mediaplex.com/ad/ck/711-11697-6916-5
_______________________________________________
Licq-devel mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/licq-devel

Reply via email to