Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 01 Sep 2015 07:20:56 +0200
From: Florian Weimer <fw@...eb.enyo.de>
To: cve-assign@...re.org
Cc: oss-security@...ts.openwall.com
Subject: CVE request: screen stack overflow (deep recursion)

Upstream bug report by Kuang-che Wu:

“
How to reproduce:
Run this command inside screen
$ printf '\x1b[10000000T'

screen will recursively call MScrollV to depth n/256. This is time consuming and will overflow stack if n is huge.
”

<https://savannah.gnu.org/bugs/?45713>

Upstream fix:

http://git.savannah.gnu.org/cgit/screen.git/commit/?id=b7484c224738247b510ed0d268cd577076958f1b

Debian bug:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797624

MScrollV creates a very large stack frame, so it could theoreticall
jump over the guard page at the top of the stack, and it might be
feasible to exploit this for something else besides denial-of-service.

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ