Public bug reported:
$ lsb_release -rd
Description: Ubuntu 16.04 LTS
Release: 16.04
$ tightvncpasswd
Using password file /home/pa/.vnc/passwd
Password:
Verify:
Would you like to enter a view-only password (y/n)? n
*** buffer overflow detected ***: tightvncpasswd terminated
======= Backtrace: =========
/lib/i386-linux-gnu/libc.so.6(+0x67257)[0xb7595257]
/lib/i386-linux-gnu/libc.so.6(__fortify_fail+0x68)[0xb76257c8]
/lib/i386-linux-gnu/libc.so.6(+0xf59b8)[0xb76239b8]
tightvncpasswd[0x8048cac]
/lib/i386-linux-gnu/libc.so.6(__libc_start_main+0xf7)[0xb7546637]
tightvncpasswd[0x8048ec3]
======= Memory map: ========
08048000-0804b000 r-xp 00000000 08:01 11283419 /usr/bin/tightvncpasswd
0804b000-0804c000 r--p 00002000 08:01 11283419 /usr/bin/tightvncpasswd
0804c000-0804d000 rw-p 00003000 08:01 11283419 /usr/bin/tightvncpasswd
Of course when we store the password, we have a
buffer overflow - how else. :)
I installed the dbgsym package and run under valgrind:
Using password file /home/pa/.vnc/passwd
Password:
Verify:
Would you like to enter a view-only password (y/n)? n
==7157== Conditional jump or move depends on uninitialised value(s)
==7157== at 0x403037B: strlen (in
/usr/lib/valgrind/vgpreload_memcheck-x86-linux.so)
==7157== by 0x8048C9D: main (vncpasswd.c:139)
==7157== Uninitialised value was created by a stack allocation
==7157== at 0x8048A21: main (vncpasswd.c:46)
** Affects: tightvnc (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1597115
Title:
tightvncpasswd crashes
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tightvnc/+bug/1597115/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs