----- Forwarded message from "Anibal L. Sacco" <[EMAIL PROTECTED]> -----
From: "Anibal L. Sacco" <[EMAIL PROTECTED]> Date: Thu, 06 Apr 2006 20:18:44 -0300 To: Joey Hess <[EMAIL PROTECTED]> Subject: Re: Bug#360989: Multiple buffer overflows in BSDgames 2.17-1 and privileges escalation vulnerability. User-Agent: Mozilla Thunderbird 1.0.7 (Windows/20050923) Joey Hess wrote: >Anibal L. Sacco wrote: > > >>The vulnerabilities are caused due to boundary errors when reading >>the player's name in pl_main.c >> >>code segment: >>printf("Your name, Captain? "); >> fflush(stdout); >> fgets(captain, sizeof captain, stdin); >> if (!*captain) >> strcpy(captain, "no name"); >> else >> captain[strlen(captain) - 1] = '\0'; >> } >> >>Being captain initialized as: char captain[80]. >> >> > >sizeof(captain) is 80 so fgets reads in at most 79 characters. The trailing >NULL will be added as the 80th character which still seems to be within >the array size to me. > > > >>There is some similar issues in Tetris, and Hack too. >> >> > >Well feel free to provide the details of those issues. > > > My mystake.. this is the vulnerable code. char buf[10]; printf("\nInitial broadside %s (grape, chain, round, double): ", n ? "right" : "left"); fflush(stdout); scanf("%s", buf); Cheers ----- End forwarded message ----- -- see shy jo
signature.asc
Description: Digital signature