severity 479039 grave
thanks

Hi Steffen,
* Steffen Joeris <[EMAIL PROTECTED]> [2008-05-02 14:46]:
[...] 
> The following CVE(0) has been issued against sip-tester.
> 
> Please check, if it applies to the debian version.

It applies to the debian version:
    482 uint16_t get_remote_video_port_media(char *msg)
    483 {
    484     char pattern[] = "m=video ";
    485     char *begin, *end;
    486     char number[5];
    487     begin = strstr(msg, pattern);
    488     if (!begin) {
    489       /* m=video not found */
    490       return 0;
    491     }
    492     begin += sizeof("m=video ") - 1;
    493     end = strstr(begin, "\r\n");
    494     if (!end)
    495       ERROR("get_remote_video_port_media: no CRLF found");
    496     memset(number, 0, 5);
    497     strncpy(number, begin, end - begin);
    498     return atoi(number);
    499 }

Looking at the code it is possible to cause a buffer overflow of number
by specifying a number to m=video that is larger than sizeof(number) bytes
because then end - begin will be > sizeof(number) and thus the strncpy call
int line 497 will overflow the number buffer. Or in other words, strncpy is
useless if used like this.

Adjusting severity.

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpXpRAdh2zto.pgp
Description: PGP signature

Reply via email to