Bug#481186: CVE-2008-2149: buffer overflows - reopen

2008-09-06 Thread Stefan Lesicnik
Hi, As the changelog indicates, there may still be various potential security flaws within this product. http://www.ocert.org/advisories/ocert-2008-014.html shows the release of a more comprehensive patch. http://www.ocert.org/analysis/2008-014/wordnet.patch Attached is the debian-debdiff to

Bug#481186: CVE-2008-2149: buffer overflows - reopen

2008-09-06 Thread Nico Golde
Hi Stefan, * Stefan Lesicnik [EMAIL PROTECTED] [2008-09-06 11:46]: As the changelog indicates, there may still be various potential security flaws within this product. http://www.ocert.org/advisories/ocert-2008-014.html shows the release of a more comprehensive patch.

Bug#481186: CVE-2008-2149: buffer overflows - reopen

2008-09-06 Thread Andreas Tille
On Sat, 6 Sep 2008, Nico Golde wrote: This patch is included wordnet 1:3.0-12. Well, not really. There was a problem with the original patch which was reported to [EMAIL PROTECTED] The problem was fixed and you can obtain patches from

Bug#481186: [Secure-testing-team] Bug#481186: CVE-2008-2149: buffer overflows

2008-05-18 Thread Moritz Muehlenhoff
Andreas Tille wrote: I can't say anything about stable though. Well, I assume they are aware of the issue and could bother me if I could / should do something, right? If there's indication that the currently known issues are just the tip of the iceberg, please ask for a review by

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-16 Thread Andreas Tille
On Thu, 15 May 2008, Andreas Tille wrote: As stated in the Gentoo BTS https://bugs.gentoo.org/show_bug.cgi?id=211491 there are potentially more issues of other sprintf()/strcpy()/strcat()/... occurences. So I wonder if you accept the attached patch as a fix for the problem. It actually

Bug#481186: [Secure-testing-team] Bug#481186: CVE-2008-2149: buffer overflows

2008-05-16 Thread Thijs Kinkhorst
On Fri, May 16, 2008 13:59, Andreas Tille wrote: I've got no answer to this question for nearly 24 hours. Because I consider it more important to fix a known issue _now_ instead of doing a long research for other issues for perhaps weeks I will upload packages with the proposed fix in the

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-16 Thread Steffen Joeris
Hi Andreas Sorry for the late reply. I've got no answer to this question for nearly 24 hours. Because I consider it more important to fix a known issue _now_ instead of doing a long research for other issues for perhaps weeks I will upload packages with the proposed fix in the next hour.

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-16 Thread Andreas Tille
On Fri, 16 May 2008, Steffen Joeris wrote: Sorry for the late reply. No problem. For testing-security just make sure you upload with priority=high . pdebuild with priority=high in changelog is currently running. I would not want to think about DTSAs or migration stuff yet, because I

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-16 Thread Nico Golde
Heyho Andreas, * Andreas Tille [EMAIL PROTECTED] [2008-05-15 14:57]: On Wed, 14 May 2008, Steffen Joeris wrote: CVE-2008-2149: [...] there are potentially more issues of other sprintf()/strcpy()/strcat()/... occurences. So I wonder if you accept the attached patch as a fix for the

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-16 Thread Andreas Tille
On Fri, 16 May 2008, Nico Golde wrote: - sprintf(tmpbuf, wn: invalid search option: %s\n, av[j]); + /* Fix CVE-2008-2149: buffer overflows Andreas Tille [EMAIL PROTECTED] */ + sprintf(tmpbuf, wn: invalid search option: %.200s\n, av[j]); Please use

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-16 Thread Sven Joachim
Am 16.05.2008 um 15:47 schrieb Andreas Tille: On Fri, 16 May 2008, Nico Golde wrote: - sprintf(tmpbuf, wn: invalid search option: %s\n, av[j]); + /* Fix CVE-2008-2149: buffer overflows Andreas Tille [EMAIL PROTECTED] */ + sprintf(tmpbuf, wn: invalid search

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-16 Thread Nico Golde
Hi Andreas, * Andreas Tille [EMAIL PROTECTED] [2008-05-16 15:53]: On Fri, 16 May 2008, Nico Golde wrote: - sprintf(tmpbuf, wn: invalid search option: %s\n, av[j]); + /* Fix CVE-2008-2149: buffer overflows Andreas Tille [EMAIL PROTECTED] */ + sprintf(tmpbuf,

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-16 Thread Andreas Tille
On Fri, 16 May 2008, Nico Golde wrote: I first thought the buffer you write into is also 200 bytes big then the 0 byte sprintf writes at the end would cause an off-by-one. I just saw that its 256 bytes big so this should be no problem. Yes, I left some space. You have to add the fix format

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-15 Thread Andreas Tille
On Wed, 14 May 2008, Steffen Joeris wrote: CVE-2008-2149: Stack-based buffer overflow in the searchwn function in Wordnet 2.0, 2.1, and 3.0 might allow context-dependent attackers to execute arbitrary code via a long command line option. NOTE: this issue probably does not cross privilege

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-14 Thread Steffen Joeris
Package: wordnet Severity: grave Tags: security Justification: user security hole Hi The following CVE(0) has been issued against wordnet. CVE-2008-2149: Stack-based buffer overflow in the searchwn function in Wordnet 2.0, 2.1, and 3.0 might allow context-dependent attackers to execute