|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2004-0982 : mpg123 buffer overflow while parsing HTTP URLs | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Thomas Biege <thomas> |
| Component: | Incidents | Assignee: | Thomas Biege <thomas> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | nadvornik, security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: | mpg123-0.59s-http-auth-overflow.patch | ||
|
Description
Thomas Biege
2004-10-21 15:19:50 UTC
<!-- SBZ_reproduce --> mpg123 -@ http://$(perl -e 'print "A" x 260')@www.somesite.com/somefile.xxx Created attachment 25313 [details]
mpg123-0.59s-http-auth-overflow.patch
This patch should fix it.
Is it OK?
Yes, looks good. I think it stops the test case mentioned above, did you test? Yes, this is tested. Packages are submited for 8.1-9.2 Can you please submit patchinfos? The second bug wasn't fixed, right?
...
sprintf (request + strlen(request),
" HTTP/1.0\r\nUser-Agent: %s/%s\r\n",
prgName, prgVersion);
...
patchinfo files done. Hmm, status of the "second bug fix"? Hello? patch incomplete, see comment #c6 I think it's missing the patch... Vladimir? Sorry for the delay.
I think this patch is sufficient, isn't it?
sprintf (request + strlen(request),
" HTTP/1.0\r\nUser-Agent: %s/%s\r\n",
- prgName, prgVersion);
+ "mpg123", prgVersion);
No problem. Yes it's ok. Another way of doing it would be: snprintf(request + strlen(request), sizeof(request)-strlen(request), " HTTP/1.0\r\nUser-Agent: %s/%s\r\n", prgName, prgVersion) Package submitted CAN-2004-0982 packages approved |