Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

overflow in su.c #4

Open
GoogleCodeExporter opened this issue Jul 30, 2015 · 1 comment
Open

overflow in su.c #4

GoogleCodeExporter opened this issue Jul 30, 2015 · 1 comment

Comments

@GoogleCodeExporter
Copy link

su.c has a trivially exploitable bug on lines 65-66:

char update[1024];
sprintf(update, "update whitelist set count=%d where _id='%s';", count,
argv[0]);

An attacker controls the size and values representing in argv[0]. When
argv[0] is greater than 1024, this will cause an overflow condition. This
might allow an attacker to execute arbitrary code.

This kind of stuff is all over su.c and is basically a nightmare.

Original issue reported on code.google.com by ioer...@gmail.com on 26 May 2010 at 3:57

@GoogleCodeExporter
Copy link
Author

This is also a possibly SQL injection issue.

Original comment by ioer...@gmail.com on 26 May 2010 at 5:20

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant