|
From: | exploit dev |
Subject: | Re: username and groupname prone to overflowing |
Date: | Mon, 23 Dec 2024 23:27:27 +0100 |
Hello,In decode_header(), assign_string_n() takes input from header.uname as value and also as size_t.If value and n are both controlled, the "l" variable is prone to overflowing inside the xmalloc(l+1)which will under-allocate p, and over-copy value into it.
[Prev in Thread] | Current Thread | [Next in Thread] |