|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2004-1772: buffer overflow in sharutils | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Marcus Meissner <meissner> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | ro, security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | CVE-2004-1772: CVSS v2 Base Score: 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Marcus Meissner
2004-09-30 21:48:24 UTC
<!-- SBZ_reproduce --> n/a at this time. Andreas has found additional buffer overflow problems. How easy is this to trigger, Andreas? The other overrun is triggered when you call shar with a long file name as argument, or when it encounters such a long name while descending a directory. This file name is then used to construct and execute a shell command in a fixed sized buffer. There are also quoting bugs, both in these directly executed shell commands and in the generated shar file, which trigger when a file name contains a single quote character. public mostly my testcase segfaulted...
pushd .
for i in `seq 1 150`
do
date > foo
mkdir aaaaaaaaaaaaaaaaaaaa
cd aaaaaaaaaaaaaaaaaaaa
done
popd
shar .>/dev/null
Segmentation fault <<<< must not happen.
ping Fixed. 9.2 is not affected? And where is the patchinfo? Marcus, Andreas said you have some old patchinfos that can be used here? (9.2 version is submitted) packages appr4oved CAN-2004-1772 I think CVE-2004-1772: CVSS v2 Base Score: 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P) |