buffer overflow in avra1.2.3a
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
avra (Ubuntu) |
Triaged
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: avra
There is a buffer overflow bug in avra1.2.3a which might lead to memory corruption, at the very most. Privilege escalation nor any kind of local exploitation is expected as it runs with the privileges of the current user.
Tracing the control flow during static analysis gives the following:-
load_arg_defines has an `strcpy(buff, define->data)` where buff is declared as `char buff[256];`. In order to inspect the values of data, we look at `struct prog_info *pi`; or rather the `args` argument of `pi`.
Memory is allocated for `args` in `alloc_
if(args-
args-
Evidently, at some point, the value depends on command line input and this input can be used to overflow the `buff` array.
visibility: | private → public |
description: | updated |
Thanks for reporting this issue.
Could you please file a bug with the upstream avra project, and link the bug here?
http:// sourceforge. net/tracker/ ?group_ id=55499& atid=477231
Thanks!