long filename Buffer Overrun

2011.01.15
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-119


Ogólna skala CVSS: 6.8/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

I see, well according to the bug report, its fixed in 2.5.2-1. I tested that version itself and sadly the fix isn't there. On Sun, Dec 13, 2009 at 1:29 AM, Patroklos Argyroudis <argp at census-labs.com>wrote: ><i> On Sat, Dec 12, 2009 at 10:59:28PM +0200, Razuel Akaharnath wrote: </I>><i> > DESCRIPTION: </I>><i> > "The gif2png program converts files from the obsolescent Graphic </I>><i> Interchange </I>><i> > Format to Portable Network Graphics <http://www.libpng.org/pub/png/>. </I>><i> The </I>><i> > conversion preserves all graphic information, including transparency, </I>><i> > perfectly. The gif2png program can even recover data from corrupted </I>><i> GIFs." </I>><i> > </I>><i> > homepage: http://catb.org/~esr/gif2png/<http://catb.org/%7Eesr/gif2png/>< </I>><i> http://catb.org/%7Eesr/gif2png/> </I>><i> > </I>><i> > VULNERABILITY: </I>><i> > gif2png does not perform proper bounds checking on the size of input </I>><i> > filename. The buffer (1025 in size) is easily overrun with a strcpy </I>><i> > function. </I>><i> > </I>><i> > AFFECTED VERSION: </I>><i> > latest: 2.5.2 </I>><i> </I>><i> I have reported this to Debian about two months ago: </I>><i> </I>><i> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550978 </I>><i> </I>><i> -- </I>><i> Patroklos Argyroudis </I>><i> http://www.census-labs.com/ </I>><i> </I>-------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20091213/c04218ac/attachment.html

Referencje:

https://bugzilla.redhat.com/show_bug.cgi?id=547515
http://openwall.com/lists/oss-security/2010/11/22/1
http://openwall.com/lists/oss-security/2010/11/21/1
http://lists.grok.org.uk/pipermail/full-disclosure/2009-December/072009.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051229.html
http://cvs.fedoraproject.org/viewvc/rpms/gif2png/devel/gif2png-overflow.patch?root=extras&view=log
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550978
http://www.vupen.com/english/advisories/2011/0023
http://www.vupen.com/english/advisories/2010/3036
http://security.gentoo.org/glsa/glsa-201101-01.xml
http://secunia.com/advisories/42796
http://openwall.com/lists/oss-security/2010/11/22/3
http://openwall.com/lists/oss-security/2010/11/22/12
http://bugs.gentoo.org/show_bug.cgi?id=346501


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top