tags 408530 +security
severity 408530 grave

On Fri, Jan 26, 2007 at 04:34:32PM +0100, John Hughes wrote:
> Package: libcapi20-3
> Version: 1:3.9.20060704-2.2
> Severity: important

> the bufprint routine used by capi_cmsg2str does an unbounded
> vsprintf into a 8192 byte buffer, perhaps hoping it's big enough.

If the content of that vsprintf can be controlled by remote peers,
this may lead to a remote security hole for daemons using CAPI
(pppd-capi-plugin, asterisk-chan-capi, capi4hylafax, ...). Or a DoS.

If the content of that vsprintf can be controlled by local users
making use of a system service (such as sending a fax, making a phone
call, ...) that uses CAPI, this is a privilege escalation or remote
authenticated user security hole, or a DoS.


If someone determines this is not exploitable, feel free to remove
security tag and take severity down to important again.

-- 
Lionel


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to