Bug#576244: privbind: 1-byte buffer overflow

2010-04-02 Thread Christian Jaeger
> tell, an attacker trying to exploit this is running in the same privilege > level as the potential gain from an exploitable buffer overrun (i.e. - no > security implications as there is no privilege escalation). This is in You assume that the attacker has full control over root; but often progra

Bug#576244: privbind: 1-byte buffer overflow

2010-04-02 Thread Shachar Shemesh
Christian Jaeger wrote: Whether this has security implications or not, I don't know. It has, literally, been years since I touched the code. As far as I can tell, an attacker trying to exploit this is running in the same privilege level as the potential gain from an exploitable buffer overru

Bug#576244: privbind: 1-byte buffer overflow

2010-04-01 Thread Christian Jaeger
Package: privbind Version: 1.1-1 Severity: normal It looks to me like privbind is not allocating enough space for the buffer that is being used for: sprintf( newpreload, "%s:%s", options.libname, ldpreload ); This needs strlen of both arguments plus 1 byte for the : plus another byte for the \0