oss-sec mailing list archives

Re: CVE id request: Multiple buffer overflow in unixODBC


From: Henri Salo <henri () nerv fi>
Date: Wed, 30 May 2012 19:56:02 +0300

On Wed, May 30, 2012 at 10:07:02AM +0200, Tomas Hoger wrote:
On Tue, 29 May 2012 09:42:42 -0300 Felipe Pena wrote:

Multiple buffer overflow in unixODBC
===========================

The library unixODBC doesn't check properly the input from FILEDSN=,
DRIVER= options in the DSN, which causes buffer overflow when passed
to the SQLDriverConnect() function.

Reports like this - covering bugs in parsing of the configuration
parameters (i.e. generally trusted input) - should include some
reasoning why these should be considered security.  Nothing obvious not
intended to break PHP safe_mode comes to mind.

-- 
Tomas Hoger / Red Hat Security Response Team

Debian-report: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=675058

Maintainer is also asking why this is security related issue. Can I get short description thanks.

- Henri Salo


Current thread: