On Wed, 14 May 2008, Steffen Joeris wrote:
CVE-2008-2149:
Stack-based buffer overflow in the searchwn function in Wordnet 2.0,
2.1, and 3.0 might allow context-dependent attackers to execute
arbitrary code via a long command line option. NOTE: this issue probably
does not cross privilege boundaries except in cases in which Wordnet is
used as a back end.
More information can be found in the gentoo bugreport(1).
As stated in the Gentoo BTS
https://bugs.gentoo.org/show_bug.cgi?id=211491
there are potentially more issues of other sprintf()/strcpy()/strcat()/...
occurences. So I wonder if you accept the attached patch as a fix for
the problem. It actually cures the long command line option problem but
not more.
Kind regards
Andreas.
--
http://fam-tille.de--- wordnet-3.0.orig/src/wn.c
+++ wordnet-3.0/src/wn.c
@@ -206,7 +206,8 @@
outsenses += do_search(av[1], optptr->pos, optptr->search,
whichsense, optptr->label);
} else {
- sprintf(tmpbuf, "wn: invalid search option: %s\n", av[j]);
+ /* Fix CVE-2008-2149: buffer overflows Andreas Tille <[EMAIL PROTECTED]> */
+ sprintf(tmpbuf, "wn: invalid search option: %.200s\n", av[j]);
display_message(tmpbuf);
errcount++;
}