bug-tar
[
Top
][
All Lists
]
Advanced
[
Date Prev
][
Date Next
][
Thread Prev
][
Thread Next
][
Date Index
][
Thread Index
]
username and groupname prone to overflowing
From
:
exploit dev
Subject
:
username and groupname prone to overflowing
Date
:
Mon, 23 Dec 2024 15:37:28 +0100
Hello,
In decode_header(), assign_string_n() takes input from header.uname as value and also as size_t.
If value and n are both controlled, the "l" variable is prone to overflowing inside the xmalloc(l+1)
which will under-allocate p, and over-copy value into it.
reply via email to
[Prev in Thread]
Current Thread
[
Next in Thread
]
username and groupname prone to overflowing
,
exploit dev
<=
Re: username and groupname prone to overflowing
,
exploit dev
,
2024/12/23
Re: username and groupname prone to overflowing
,
Paul Eggert
,
2024/12/23
Prev by Date:
Re: new_argc is prone to integer overflow
Next by Date:
Re: username and groupname prone to overflowing
Previous by thread:
new_argc is prone to integer overflow
Next by thread:
Re: username and groupname prone to overflowing
Index(es):
Date
Thread