Public bug reported:

---------- Forwarded message ----------
From: Anon Sricharoenchai <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>, Ubuntu Bug Tracking System 
<[EMAIL PROTECTED]>, [EMAIL PROTECTED]
Date: Mon, 19 Jun 2006 21:09:17 -0700 (PDT)
Subject: mimms: patch to fix many buffer overflows vulnerability
Package: mimms
Version: 0.0.9-1
Severity: grave
Justification: user security hole
Tags: security patch

According to the patch attached in this report, it has many possible buffer
overflows.
For example,
- memcpy(buf, data, length) without bounding the limit of "length",
 while "length" depend on the input data incoming from the internet.
- read(s, data, BUF_SIZE) in main(), where BUF_SIZE is much greater than
 sizeof(data) which is only 1024 chars allocated in main(), while
 BUF_SIZE is defined as 1024*128.


-- System Information:
Debian Release: testing/unstable
Architecture: i386 (i686)
Kernel: Linux 2.6.10-5-386
Locale: LANG=C, LC_CTYPE=thai

Versions of packages mimms depends on:
ii  libc6                   2.3.5-1ubuntu12  GNU C Library: Shared libraries an
ii  libgcc1                 1:3.4.2-2ubuntu1 GCC support library
ii  libpopt0                1.7-4            lib for parsing cmdline parameters
ii  libstdc++5              1:3.3.4-9ubuntu5 The GNU Standard C++ Library v3
ii  libuuid1                1.35-6ubuntu1    Universally unique id library

-- no debconf information

** Affects: mimms (Ubuntu)
     Importance: Untriaged
         Status: Unconfirmed

** Attachment added: "patch to fix many buffer overflows vulnerability in mimms"
   http://librarian.launchpad.net/3152675/mimms-0.0.9.buffer_overflow.diff

-- 
patch to fix many buffer overflows vulnerability
https://launchpad.net/bugs/50932

--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to