brian m. carlson
2008-Apr-17 20:53 UTC
[Secure-testing-team] Bug#476603: acon: multiple buffer overflows
Package: acon Version: 1.0.5-7 Severity: critical Tags: security In addition to the security bug mentioned in #475733, there are four buffer overflows that I have found. acon.c:53 (already reported) and child.c:104 A very large value of $HOME can create a buffer overflow with sprintf. Use snprintf instead. menu.c:100, menu.c:221, menu.c:243 On terminals with greater than 211 columns (like some framebuffers), the buffer line will be overflowed, since it only has 400 bytes of space. ((getmaxx()-10)*2)-2 > 400 These are critical due to the local root exploit contained in #475733. Once the setuid bug is fixed, these will become grave. There may be more. I have gone through the code as thoroughly as I could, but the code is barely legible and uses lots of fixed-sized buffers. For these reasons, it is my recommendation that acon not be included in a stable release. -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, ''unstable''), (1, ''experimental'') Architecture: amd64 (x86_64) Kernel: Linux 2.6.25-rc8-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8) Shell: /bin/sh linked to /bin/dash -- brian m. carlson / brian with sandals: Houston, Texas, US +1 713 440 7475 | http://crustytoothpaste.ath.cx/~bmc | My opinion only troff on top of XML: http://crustytoothpaste.ath.cx/~bmc/code/thwack OpenPGP: RSA v4 4096b 88AC E9B2 9196 305B A994 7552 F1BA 225C 0223 B187 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 827 bytes Desc: Digital signature Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20080417/10605b10/attachment.pgp