Package: sshm
Version: 0.4.2-1
Severity: normal

sshm is vulnerable due to uncontrolled format string usage with sscanf. 
Furthermore a vulnerability caused by unsafe usage of std::cin exists.

Reproduction: 
    sscanf: create a entry/line in $HOME/.sshm to cause a segfault:
        "a b c dddd /* d repeats about 200 times */"

    std:cin: Create a new server entry with `sshm --add`. Enter a Hostname/IP 
longer than aprox. 250 characters. The application will claim, that only 85 
characters are allowed. Type random data to finish the add dialog. The program 
will segfault.

Both vulnerabilities may be used to inject shellcode and therefore execute 
arbitrary code in a users context.

-- System Information:
Debian Release: 6.0.6
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_US.UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages sshm depends on:
ii  libc6                 2.11.3-4           Embedded GNU C Library: Shared lib
ii  libgcc1               1:4.4.5-8          GCC support library
ii  libstdc++6            4.4.5-8            The GNU Standard C++ Library v3
ii  openssh-client        1:5.5p1-6+squeeze2 secure shell (SSH) client, for sec

sshm recommends no packages.

sshm suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to