brian m. carlson wrote:
> Package: acon
> Version: 1.0.5-7
> Severity: critical
> Tags: security
>
> In addition to the security bug mentioned in #475733, there are four  
> buffer overflows that I have found.
>
> acon.c:53 (already reported) and child.c:104
>   A very large value of $HOME can create a buffer overflow with sprintf.  
>   Use snprintf instead.
>  menu.c:100, menu.c:221, menu.c:243
>   On terminals with greater than 211 columns (like some framebuffers),   
> the buffer line will be overflowed, since it only has 400 bytes of   
> space.  ((getmaxx()-10)*2)-2 > 400
>
> These are critical due to the local root exploit contained in #475733.   
> Once the setuid bug is fixed, these will become grave.
>
> There may be more.  I have gone through the code as thoroughly as I  
> could, but the code is barely legible and uses lots of fixed-sized  
> buffers.  For these reasons, it is my recommendation that acon not be  
> included in a stable release.

Ack, this package should only be included in Lenny after a complete
review by a member of the Debian audit team and communication with
upstream to make sure such errors won't be re-introduced in later
development.

Cheers,
        Moritz



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to