|
|
Message-ID: <rvubtf$lnv$1@ciao.gmane.io>
Date: Tue, 9 Feb 2021 16:06:07 -0000 (UTC)
From: Tavis Ormandy <taviso@...il.com>
To: oss-security@...ts.openwall.com
Subject: screen crash processing combining characters
Hello, I noticed someone posted this to the screen-devel list. I can
reproduce it here, just catting the testcase does crash my screen
session.
https://lists.gnu.org/archive/html/screen-devel/2021-02/msg00000.html
(I think it wasn't supposed to be public, but it is, so better it's
visible to security teams)
It looks like it might be exploitable at first glance, I see a crash
here in encoding.c, because i is out of range.
1411 else if (!combchars[i])
1412 {
1413 combchars[i] = (struct combchar *)malloc(sizeof(struct combchar));
1414 if (!combchars[i])
1415 return;
1416 combchars[i]->prev = i;
1417 combchars[i]->next = i;
1418 }
Exploitable or not, it would be annoying if someone stuffed this into logfiles
being tailed, or whatever.
Tavis.
--
_o) $ lynx lock.cmpxchg8b.com
/\\ _o) _o) $ finger taviso@....org
_\_V _( ) _( ) @taviso
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.