lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: 15 May 2004 11:09:00 -0000 From: <lw@...ia.edu.pl> To: bugtraq@...urityfocus.com Subject: lha buffer overflow(s) again i posted it yesterday to bugs@...hat.com but mailbox is disabled for that recipient :-/ Date: Sat, 15 May 2004 00:24:09 +0200 (CEST) From: Lukasz Wojtow <gnz@...dent.wszia.edu.pl> To: bugs@...hat.com Subject: LHA buffer overflow (not the last one already fixed) it seems that lha is quite poorly written. after your last advisory, i decided to take a look at the code and found 2 BO in function extract_one (file lhext.c): if (extract_directory) sprintf(name, "%s/%s", extract_directory, q); else strcpy(name, q); i bet there is more... Regards Lukasz Wojtow
Powered by blists - more mailing lists