bug-tar
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

username and groupname prone to overflowing


From: exploit dev
Subject: username and groupname prone to overflowing
Date: Mon, 23 Dec 2024 15:37:28 +0100

Hello,

In decode_header(), assign_string_n() takes input from header.uname as value and also as size_t.
image.png
If value and n are both controlled, the "l" variable is prone to overflowing inside the xmalloc(l+1)
which will under-allocate p, and over-copy value into it.


image.png


reply via email to

[Prev in Thread] Current Thread [Next in Thread]