Bug#481186: CVE-2008-2149: buffer overflows - reopen

2008-09-06 Thread Andreas Tille
On Sat, 6 Sep 2008, Nico Golde wrote: This patch is included wordnet 1:3.0-12. Well, not really. There was a problem with the original patch which was reported to [EMAIL PROTECTED] The problem was fixed and you can obtain patches from http://svn.debian.org/wsvn/debian-science/packages

Bug#481186: CVE-2008-2149: buffer overflows - reopen

2008-09-06 Thread Nico Golde
Hi Stefan, * Stefan Lesicnik <[EMAIL PROTECTED]> [2008-09-06 11:46]: > As the changelog indicates, there may still be various potential > security flaws within this product. > > http://www.ocert.org/advisories/ocert-2008-014.html > > shows the release of a more comprehensive patch. > > http://ww

Bug#481186: CVE-2008-2149: buffer overflows - reopen

2008-09-06 Thread Stefan Lesicnik
Hi, As the changelog indicates, there may still be various potential security flaws within this product. http://www.ocert.org/advisories/ocert-2008-014.html shows the release of a more comprehensive patch. http://www.ocert.org/analysis/2008-014/wordnet.patch Attached is the debian-debdiff to a

Bug#481186: [Secure-testing-team] Bug#481186: CVE-2008-2149: buffer overflows

2008-05-18 Thread Moritz Muehlenhoff
Andreas Tille wrote: > > I can't say anything about stable though. > > Well, I assume they are aware of the issue and could bother me if I > could / should do something, right? If there's indication that the currently known issues are just the tip of the iceberg, please ask for a review by debia

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-16 Thread Andreas Tille
On Fri, 16 May 2008, Nico Golde wrote: I first thought the buffer you write into is also 200 bytes big then the 0 byte sprintf writes at the end would cause an off-by-one. I just saw that its 256 bytes big so this should be no problem. Yes, I left some space. You have to add the fix format st

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-16 Thread Nico Golde
Hi Andreas, * Andreas Tille <[EMAIL PROTECTED]> [2008-05-16 15:53]: > On Fri, 16 May 2008, Nico Golde wrote: > > >>- sprintf(tmpbuf, "wn: invalid search option: %s\n", av[j]); > >>+ /* Fix CVE-2008-2149: buffer overflows Andreas Tille <[EMAIL > >>PROTECTED]> */ > >>+

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-16 Thread Sven Joachim
Am 16.05.2008 um 15:47 schrieb Andreas Tille: > On Fri, 16 May 2008, Nico Golde wrote: > >>> - sprintf(tmpbuf, "wn: invalid search option: %s\n", av[j]); >>> + /* Fix CVE-2008-2149: buffer overflows Andreas Tille <[EMAIL >>> PROTECTED]> */ >>> + sprintf(tmpbuf, "wn:

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-16 Thread Andreas Tille
On Fri, 16 May 2008, Nico Golde wrote: - sprintf(tmpbuf, "wn: invalid search option: %s\n", av[j]); + /* Fix CVE-2008-2149: buffer overflows Andreas Tille <[EMAIL PROTECTED]> */ + sprintf(tmpbuf, "wn: invalid search option: %.200s\n", av[j]); Please u

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-16 Thread Nico Golde
Heyho Andreas, * Andreas Tille <[EMAIL PROTECTED]> [2008-05-15 14:57]: > On Wed, 14 May 2008, Steffen Joeris wrote: > > >CVE-2008-2149: [...] > there are potentially more issues of other sprintf()/strcpy()/strcat()/... > occurences. So I wonder if you accept the attached patch as a fix for > the

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-16 Thread Andreas Tille
On Fri, 16 May 2008, Steffen Joeris wrote: Sorry for the late reply. No problem. For testing-security just make sure you upload with priority=high . pdebuild with priority=high in changelog is currently running. I would not want to think about DTSAs or migration stuff yet, because I susp

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-16 Thread Steffen Joeris
Hi Andreas Sorry for the late reply. > I've got no answer to this question for nearly 24 hours. Because I > consider it more important to fix a known issue _now_ instead of doing a > long research for other issues for perhaps weeks I will upload packages > with the proposed fix in the next hour.

Bug#481186: [Secure-testing-team] Bug#481186: CVE-2008-2149: buffer overflows

2008-05-16 Thread Thijs Kinkhorst
On Fri, May 16, 2008 13:59, Andreas Tille wrote: > I've got no answer to this question for nearly 24 hours. Because I > consider it more important to fix a known issue _now_ instead of doing a > long research for other issues for perhaps weeks I will upload packages > with the proposed fix in the

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-16 Thread Andreas Tille
On Thu, 15 May 2008, Andreas Tille wrote: As stated in the Gentoo BTS https://bugs.gentoo.org/show_bug.cgi?id=211491 there are potentially more issues of other sprintf()/strcpy()/strcat()/... occurences. So I wonder if you accept the attached patch as a fix for the problem. It actually cur

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-15 Thread Andreas Tille
On Wed, 14 May 2008, Steffen Joeris wrote: CVE-2008-2149: Stack-based buffer overflow in the searchwn function in Wordnet 2.0, 2.1, and 3.0 might allow context-dependent attackers to execute arbitrary code via a long command line option. NOTE: this issue probably does not cross privilege bounda

Bug#481186: CVE-2008-2149: buffer overflows

2008-05-14 Thread Steffen Joeris
Package: wordnet Severity: grave Tags: security Justification: user security hole Hi The following CVE(0) has been issued against wordnet. CVE-2008-2149: Stack-based buffer overflow in the searchwn function in Wordnet 2.0, 2.1, and 3.0 might allow context-dependent attackers to execute arbitrar