Public bug reported:

$ lsb_release -rd
Description:    Ubuntu 16.04 LTS
Release:        16.04


$ tightvncpasswd
Using password file /home/pa/.vnc/passwd
Password: 
Verify:   
Would you like to enter a view-only password (y/n)? n
*** buffer overflow detected ***: tightvncpasswd terminated
======= Backtrace: =========
/lib/i386-linux-gnu/libc.so.6(+0x67257)[0xb7595257]
/lib/i386-linux-gnu/libc.so.6(__fortify_fail+0x68)[0xb76257c8]
/lib/i386-linux-gnu/libc.so.6(+0xf59b8)[0xb76239b8]
tightvncpasswd[0x8048cac]
/lib/i386-linux-gnu/libc.so.6(__libc_start_main+0xf7)[0xb7546637]
tightvncpasswd[0x8048ec3]
======= Memory map: ========
08048000-0804b000 r-xp 00000000 08:01 11283419   /usr/bin/tightvncpasswd
0804b000-0804c000 r--p 00002000 08:01 11283419   /usr/bin/tightvncpasswd
0804c000-0804d000 rw-p 00003000 08:01 11283419   /usr/bin/tightvncpasswd


Of course when we store the password, we have a
buffer overflow - how else. :)

I installed the dbgsym package and run under valgrind:

Using password file /home/pa/.vnc/passwd
Password: 
Verify:   
Would you like to enter a view-only password (y/n)? n
==7157== Conditional jump or move depends on uninitialised value(s)
==7157==    at 0x403037B: strlen (in 
/usr/lib/valgrind/vgpreload_memcheck-x86-linux.so)
==7157==    by 0x8048C9D: main (vncpasswd.c:139)
==7157==  Uninitialised value was created by a stack allocation
==7157==    at 0x8048A21: main (vncpasswd.c:46)

** Affects: tightvnc (Ubuntu)
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1597115

Title:
  tightvncpasswd crashes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tightvnc/+bug/1597115/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to