Bug#729276: staden-io-lib-utils: bufferoverflow in index_tar

2013-11-30 Thread Sang Kil Cha
Hi, Yes I think I did submitted it to upstream. I don't have a particular patch, but I believe it is trivial to add a check for the overflow. Thanks, Sang Kil On Sat, Nov 30, 2013 at 3:40 AM, Charles Plessy wrote: > Le Sun, Nov 10, 2013 at 09:20:08PM -0500, Sang Kil Cha a écrit : &g

Bug#729277: pvm-dev: buffer overflow in trcsort

2013-11-11 Thread Sang Kil Cha
to the public BTS as well. So if you think this program is not on the attack surface, then please ignore the report. Thanks, Sang Kil On Mon, Nov 11, 2013 at 4:21 AM, Steinar H. Gunderson wrote: > On Sun, Nov 10, 2013 at 09:19:30PM -0500, Sang Kil Cha wrote: >> Package: pvm-dev >>

Bug#729277: pvm-dev: buffer overflow in trcsort

2013-11-11 Thread Sang Kil Cha
I concur. We thought they are different bugs, but it was our mistake. On Mon, Nov 11, 2013 at 9:02 AM, Steinar H. Gunderson wrote: > On Mon, Nov 11, 2013 at 08:54:02AM -0500, Sang Kil Cha wrote: >> I was running a tool called Mayhem on linux binaries to find vulnerabilities. >>

Bug#729278: trueprint: buffer overflow

2013-11-10 Thread Sang Kil Cha
Package: trueprint Version: 5.3-4 Severity: grave Tags: security Justification: user security hole trueprint has a buffer overflow vulnerability. A PoC file is attached. $ /usr/bin/trueprint foo Program received signal SIGSEGV, Segmentation fault. 0xbf81 in ?? () (gdb) -- System Informat

Bug#729276: staden-io-lib-utils: bufferoverflow in index_tar

2013-11-10 Thread Sang Kil Cha
Package: staden-io-lib-utils Version: 1.12.4-1 Severity: grave Tags: security Justification: user security hole index_tar has a buffer overflow vulnerability. A PoC file is attached. $ gdb --args /usr/bin/index_tar foo Program received signal SIGSEGV, Segmentation 0x41414141 in ?? () (gdb) -

Bug#729277: pvm-dev: buffer overflow in trcsort

2013-11-10 Thread Sang Kil Cha
Package: pvm-dev Version: 3.4.5-12.5 Severity: grave Tags: security Justification: user security hole trcsort has a buffer overflow vulnerability. A PoC file is attached. Command line to reproduce the bug: $ /usr/bin/trcsort foo -- System Information: Debian Release: 7.1 APT prefers stable

Bug#729275: mpeg3-utils: bufferoverflow in mpeg3cat

2013-11-10 Thread Sang Kil Cha
Package: mpeg3-utils Version: 1.5.4-5 Severity: grave Tags: security Justification: user security hole mpeg3cat has a buffer overflow vulnerability. A PoC file is attached. gdb --args /usr/bin/mpeg3cat foo.mp3 Program received signal SIGSEGV, Segmentation fault. 0x41414141 in ?? () (gdb) --

Bug#729274: binutils-h8300-hms: bufferoverflow in h8300-hitachi-coff-size

2013-11-10 Thread Sang Kil Cha
Package: binutils-h8300-hms Version: 2.16.1-8 Severity: grave Tags: security Justification: user security hole h8300-hitachi-coff-size has a buffer overflow vulnerability. A PoC file is attached. $ gdb --args /usr/bin/h8300-hitachi-coff-size foo Program received signal SIGSEGV, Segmentation faul

Bug#729273: graphviz: buffer overflow in dijkstra

2013-11-10 Thread Sang Kil Cha
Package: graphviz Version: 2.26.3-14 Severity: grave Tags: security Justification: user security hole dijkstra (also nop) has a buffer overflow vulnerability. A PoC file is attached. command line to reproduce: $ /usr/bin/dijkstra a < foo or $ /usr/bin/nop foo Program received signal SIGSEGV, S

Bug#699820: stack smashing when reading ics file

2013-02-05 Thread Sang Kil Cha
Package: imview Version: 1.1.9c-9 Severity: grave Tags: security imview has stack smashing vulnerability when parsing ics header @ io/readics.cxx:320      /* get the filename from the ICS file */          t = temp1;              while (*bp != delim2)                      *t++ = *bp++; This bug

Bug#699625: unix socket privilege escalation

2013-02-02 Thread Sang Kil Cha
Package: latd Version: 1.30 Severity: critical Tags: security -- System Information: Debian Release: 7.0 APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTY

Bug#693174: tar null pointer deref. segfault

2012-11-13 Thread Sang Kil Cha
Package: tar Version: 1.26-4 Severity: important tar has a null pointer dereference bug with option (-T) if a file starts with a null byte character. echo -en "\x00" > foo tar -T foo The above commands will segfault tar. -- System Information: Debian Release: wheezy/sid APT prefers test

Bug#684903: binutils: srec_scan null dereference

2012-08-14 Thread Sang Kil Cha
Package: binutils Version: 2.22-6.1 Severity: normal Tags: patch There is a null dereference bug in srec_scan (srec.c) around Line 480 -- 615. This bug causes any bintuils (nm, objdump, objcopy, etc.) to be crashed. If Line 480 evalutes to 0, then the buf pointer will be used later as a NULL poin

Bug#680973: alsaplayer-common: segfaulting at option -J

2012-07-09 Thread Sang Kil Cha
Package: alsaplayer-common Version: 0.99.80-5.1 Severity: normal Tags: patch alsaplayer is segfaulting because of the wrong option string in getopt. Here is the patch for the bug: --- Main.cpp.orig 2012-07-09 12:06:56.0 -0400 +++ Main.cpp.patched2012-07-09 12:07:14.0 -0

Bug#662194: freeradius: Bufferoverflow vulnerability in radmin

2012-03-04 Thread Sang Kil Cha
Package: freeradius Version: 2.1.10 Severity: important Tags: squeeze sid There is a buffer overflow bug in radmin program in freeradius-server (radmin), in conffile.c file. In function cf_expand_variables, there is a getenv call, and the env value is copied to a buffer without checking the lengt