oss-sec mailing list archives
CVE Request - OpenSLP 2.0 Memory Corruption
From: Reno Robert <renorobert () gmail com>
Date: Tue, 27 Sep 2016 17:29:42 +0530
Hi, The following commit fixes a memory corruption bug that I reported in OpenSLP: https://sourceforge.net/p/openslp/mercurial/ci/34fb3aa5e6b4997fa21cb614e480de36da5dbc9a/ Below are the details of the issue: static int SLPFoldWhiteSpace(size_t len, char * str) { char * p = str, * ep = str + len; while (p < ep) { if (isspace(*p)) { char * ws2p = ++p; while (isspace(*p)) p++; len -= p - ws2p; memmove(ws2p, p, ep - p); The outer while loop checks for p < ep, but lack of bound check in inner while loop could result in p > ep. This will result in passing a very large 'size_t len' (ep - p) parameter for memmove(). Could you assign a CVE for this? -- Regards, Reno Robert http://v0ids3curity.blogspot.in/
Current thread:
- CVE Request - OpenSLP 2.0 Memory Corruption Reno Robert (Sep 27)
- Re: CVE Request - OpenSLP 2.0 Memory Corruption cve-assign (Sep 27)
- <Possible follow-ups>
- Re: CVE Request - OpenSLP 2.0 Memory Corruption jericho (Sep 28)
- Re: CVE Request - OpenSLP 2.0 Memory Corruption cve-assign (Sep 28)