lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080406164643.4983.qmail@securityfocus.com>
Date: 6 Apr 2008 16:46:43 -0000
From: jose@...os.org
To: bugtraq@...urityfocus.com
Subject: openMosix userspace library stack-based buffer overflow


title: openMosix userspace library stack-based buffer overflow
Discovered by: Jose Carlos Norte

There are a lot of buffer overflows present in the library of the openMosix project, documented at: 

http://www.openmosixview.com/docs/openMosixAPI.html

The vulnerable code is in:

http://openmosix.cvs.sourceforge.net/openmosix/userspace-tools/moslib/libmosix.c?revision=1.6&view=markup

134 int64_t
135 msx_readnode(int node, const char *item)
136 {
137 char fn[40];
138 int64_t val;
139
140 if(!node && !(node = msx_read("/proc/hpc/admin/mospe")))
141 return(-1);
142 sprintf(fn, "/proc/hpc/nodes/%d/%s", node, item); 

in line 142 there is no check against overflow in "item" argument.

Every applications using this library, can be vulnerable to attacks exploiting this flaw.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ