Package: prozilla
Version: 1:1.3.7.3-1
Severity: grave

prozilla has another security hole. A format string vulnerability allows
remote code execution. I've not verified this, but here's the exploit:

http://downloads.securityfocus.com/vulnerabilities/exploits/prozillaFormatString.c

Based on info at the end of this gentoo bug repprt, the format string
problem involves a double expansion of a string from the server between
message() and curses_message().

In message(), we have:

  va_start(vp, args);
  vsnprintf(p, sizeof(p), args, vp);
  va_end(vp);

  switch (rt.display_mode)
    {
    case DISPLAY_CURSES:
      curses_message(p);

The above vsnprintf is vulnerable to a format string attack.

In curses_message(), we have:

    va_start(vp, args);
    vsnprintf(p, sizeof(p), args, vp);
    va_end(vp);

Also vulnerable.

There may be others. Upstream is apparently aware of this vulnerability.

-- 
see shy jo

Attachment: signature.asc
Description: Digital signature

Reply via email to