Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix heap buffer overflow in decompileCALLFUNCTION #90

Merged
merged 1 commit into from
Oct 11, 2017

Conversation

hlef
Copy link
Contributor

@hlef hlef commented Oct 6, 2017

Make sure that n > 1 before checking for the previous action in the actions array, otherwise an overflow may occur.

This PR fixes CVE-2017-11734 (fixes #83).

@hlef
Copy link
Contributor Author

hlef commented Oct 6, 2017

Hum, something is wrong: first condition should be n >= 1 and not n > 1.

Make sure that n > 0 before checking for the previous action in the
actions array, otherwise an overflow may occur.

This commit fixes CVE-2017-11734 (fixes libming#83).
@hlef
Copy link
Contributor Author

hlef commented Oct 6, 2017

Pull request updated.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

heap buffer overflow in decompileCALLFUNCTION
2 participants