Bug#1034736: bullseye-pu: package pev/0.81-3+deb11u1
Control: tags -1 + confirmed
On Sat, 2023-04-22 at 22:52 -0300, David da Silva Polverari wrote:
> Package: release.debian.org
> Severity: important
>
As noted (and already fixed) "normal" was the correct choice here.
> A buffer overflow vulnerability exists in Pev 0.81 via the pe_exports
> function from exports.c. The array offsets_to_Names is dynamically
> allocated on the stack using exp->NumberOfFunctions as its size.
> However, the loop uses exp->NumberOfNames to iterate over it and set
> its
> components value. Therefore, the loop code assumes that
> exp->NumberOfFunctions is greater than ordinal at each iteration.
> This
> can lead to arbitrary code execution.
>
Please go ahead.
Regards,
Adam
Reply to: