oss-sec mailing list archives
Re: CVE Request: gif2png: command-line buffer overflow problem
From: Kurt Seifried <kurt () seifried org>
Date: Sun, 21 Nov 2010 18:04:10 -0700
How could this possibly be exploited? If you can trick a user into running gif2png [exploit payload], then that user has already lost.
It was reported that some CGI scripts/etc use it automatically so by using a long file name it may be possible. Personally I'm not worried but Debian/Fedora have fixed it as a security issue so if that is the case a CVE would be nice for tracking purposes.
See also: make `perl -e 'print "A"x10000'` -Dan
-- Kurt Seifried kurt () seifried org tel: 1-703-879-3176
Current thread:
- CVE Request: gif2png: command-line buffer overflow problem Kurt Seifried (Nov 22)
- Re: CVE Request: gif2png: command-line buffer overflow problem Josh Bressers (Nov 22)
- Re: CVE Request: gif2png: command-line buffer overflow problem Dan Rosenberg (Nov 22)
- Re: CVE Request: gif2png: command-line buffer overflow problem Kurt Seifried (Nov 22)
- Re: CVE Request: gif2png: command-line buffer overflow problem Steven M. Christey (Nov 22)
- Re: CVE Request: gif2png: command-line buffer overflow problem Kurt Seifried (Nov 22)
- <Possible follow-ups>
- Re: CVE Request: gif2png: command-line buffer overflow problem Benji (Nov 22)
- Re: CVE Request: gif2png: command-line buffer overflow problem Steven M. Christey (Nov 22)