bug-tar
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: username and groupname prone to overflowing


From: exploit dev
Subject: Re: username and groupname prone to overflowing
Date: Mon, 23 Dec 2024 23:27:27 +0100

my bad, I missed that uname is of max size 31.


Le lun. 23 déc. 2024 à 15:37, exploit dev <exploitdevvv@gmail.com> a écrit :
Hello,

In decode_header(), assign_string_n() takes input from header.uname as value and also as size_t.
image.png
If value and n are both controlled, the "l" variable is prone to overflowing inside the xmalloc(l+1)
which will under-allocate p, and over-copy value into it.


image.png


reply via email to

[Prev in Thread] Current Thread [Next in Thread]