Bug#729276: staden-io-lib-utils: bufferoverflow in index_tar

2013-11-30 Thread Sang Kil Cha
Hi, Yes I think I did submitted it to upstream. I don't have a particular patch, but I believe it is trivial to add a check for the overflow. Thanks, Sang Kil On Sat, Nov 30, 2013 at 3:40 AM, Charles Plessy wrote: > Le Sun, Nov 10, 2013 at 09:20:08PM -0500, Sang Kil Cha a écrit : &g

Bug#729277: pvm-dev: buffer overflow in trcsort

2013-11-11 Thread Sang Kil Cha
to the public BTS as well. So if you think this program is not on the attack surface, then please ignore the report. Thanks, Sang Kil On Mon, Nov 11, 2013 at 4:21 AM, Steinar H. Gunderson wrote: > On Sun, Nov 10, 2013 at 09:19:30PM -0500, Sang Kil Cha wrote: >> Package: pvm-dev >>

Bug#729277: pvm-dev: buffer overflow in trcsort

2013-11-11 Thread Sang Kil Cha
I concur. We thought they are different bugs, but it was our mistake. On Mon, Nov 11, 2013 at 9:02 AM, Steinar H. Gunderson wrote: > On Mon, Nov 11, 2013 at 08:54:02AM -0500, Sang Kil Cha wrote: >> I was running a tool called Mayhem on linux binaries to find vulnerabilities. >>

Bug#729278: trueprint: buffer overflow

2013-11-10 Thread Sang Kil Cha
Package: trueprint Version: 5.3-4 Severity: grave Tags: security Justification: user security hole trueprint has a buffer overflow vulnerability. A PoC file is attached. $ /usr/bin/trueprint foo Program received signal SIGSEGV, Segmentation fault. 0xbf81 in ?? () (gdb) -- System Informat

Bug#729277: pvm-dev: buffer overflow in trcsort

2013-11-10 Thread Sang Kil Cha
Package: pvm-dev Version: 3.4.5-12.5 Severity: grave Tags: security Justification: user security hole trcsort has a buffer overflow vulnerability. A PoC file is attached. Command line to reproduce the bug: $ /usr/bin/trcsort foo -- System Information: Debian Release: 7.1 APT prefers stable

Bug#729275: mpeg3-utils: bufferoverflow in mpeg3cat

2013-11-10 Thread Sang Kil Cha
Package: mpeg3-utils Version: 1.5.4-5 Severity: grave Tags: security Justification: user security hole mpeg3cat has a buffer overflow vulnerability. A PoC file is attached. gdb --args /usr/bin/mpeg3cat foo.mp3 Program received signal SIGSEGV, Segmentation fault. 0x41414141 in ?? () (gdb) --

Bug#729274: binutils-h8300-hms: bufferoverflow in h8300-hitachi-coff-size

2013-11-10 Thread Sang Kil Cha
Package: binutils-h8300-hms Version: 2.16.1-8 Severity: grave Tags: security Justification: user security hole h8300-hitachi-coff-size has a buffer overflow vulnerability. A PoC file is attached. $ gdb --args /usr/bin/h8300-hitachi-coff-size foo Program received signal SIGSEGV, Segmentation faul

Bug#699820: stack smashing when reading ics file

2013-02-05 Thread Sang Kil Cha
Package: imview Version: 1.1.9c-9 Severity: grave Tags: security imview has stack smashing vulnerability when parsing ics header @ io/readics.cxx:320      /* get the filename from the ICS file */          t = temp1;              while (*bp != delim2)                      *t++ = *bp++; This bug

Bug#699625: unix socket privilege escalation

2013-02-02 Thread Sang Kil Cha
Package: latd Version: 1.30 Severity: critical Tags: security -- System Information: Debian Release: 7.0 APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTY