Bug#302097: supposed security hole due to buffer overflow in input filename

2005-03-31 Thread Joey Hess
Florian Weimer wrote: > unshar archives are unchecked mobile code anyway, so this is not a > security problem at all. Hmm, that sucks, I assumed it had been rewritten to extract shell archives w/o actually executing them at some point in the past 15 or 20 years. Should have big warnings not to run

Bug#302097: supposed security hole due to buffer overflow in input filename

2005-03-31 Thread Florian Weimer
* Joey Hess: > Exploitation of this problem would seem to be limited to systems that > take arbitrary files, perhaps uploaded via ftp, and run unshar on them. unshar archives are unchecked mobile code anyway, so this is not a security problem at all. (A similar bug in shar could be considered di

Bug#302097: supposed security hole due to buffer overflow in input filename

2005-03-30 Thread Santiago Vila
On Tue, 29 Mar 2005, Joey Hess wrote: > Package: sharutils > Version: 1:4.2.1-11 > Severity: normal > Tags: security > > [EMAIL PROTECTED]:/tmp>unshar `perl -e 'print "A"x1500'`/tmp/testing > [...] > > This buffer overflow was apparently discovered by gentoo developers, see > http://bugs.gentoo.

Bug#302097: supposed security hole due to buffer overflow in input filename

2005-03-29 Thread Joey Hess
Package: sharutils Version: 1:4.2.1-11 Severity: normal Tags: security [EMAIL PROTECTED]:/tmp>unshar `perl -e 'print "A"x1500'`/tmp/testing AA/tmp/testing: /tmp/