FYI
-- Forwarded message --
From: Peter Gutmann
Date: Sun, May 13, 2012 at 3:52 PM
Subject: Re: dumpasn1: Off-By-One overflow
To: ma...@debian.org
Hi,
>Would you consider this patch as valid ?
I just increased the buffer size to compensate, the change will be present in
the n
Dear Peter,
I am considering applying the following patch to dumpasn1 in debian:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=429961
Would you consider this patch as valid ?
Thanks much.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of
tags 429961 confirmed
thanks
attaching the file to BTS.
bug429961.asn1
Description: Binary data
Package: dumpasn1
Version: 20030222-2
Severity: normal
Hi,
It is possible to cause an off-by-one overflow in the ASN1_Item structure by
causing:
item->header[ i + index ] = ch;
To write to position 8 of the header by causing i+index to equal 8.
This is the file used:
ff d6 a3 54 84
4 matches
Mail list logo