First published: Tue Jun 12 2012(Updated: )
Created <span class="bz_obsolete"><a href="attachment.cgi?id=591258&action=diff" name="attach_591258" title="proposed patch to fix possible buffer overflows.">attachment 591258</a> <a href="attachment.cgi?id=591258&action=edit" title="proposed patch to fix possible buffer overflows.">[details]</a></span> proposed patch to fix possible buffer overflows. Description of problem: compiler warning: call ... will always overflow destination buffer. indeed, there is a trivial bug in the code, no space is reserved for trailing \0. patch to fix: --- libytnef-1.5/ytnef.c 2004-08-26 17:09:05.000000000 +0000 +++ libytnef-1.5/ytnef.c 2012-06-08 19:34:07.826123387 +0000 @@ -1327,7 +1327,7 @@ ULONG compressedSize, uncompressedSize, magic, crc32; comp_Prebuf.size = strlen(RTF_PREBUF); - comp_Prebuf.data = calloc(comp_Prebuf.size, 1); + comp_Prebuf.data = calloc(comp_Prebuf.size+1, 1); strcpy(comp_Prebuf.data, RTF_PREBUF); src = p->data; Version-Release number of selected component (if applicable): libytnef-1.5-7.fc17
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Randall Hand Yerase\'s Tnef Stream Reader | ||
Fedora | =16 | |
Fedora | =17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-5109 is a vulnerability that has been categorized with a medium severity rating due to potential buffer overflows.
To fix CVE-2010-5109, it is recommended to apply the proposed patch provided in the associated bug report.
CVE-2010-5109 affects Randall Hand's Yerase's Tnef Stream Reader as well as Fedora versions 16 and 17.
CVE-2010-5109 involves buffer overflow vulnerabilities that could be exploited in certain software.
Yes, there have been public discussions about CVE-2010-5109 in security mailing lists and bug tracking systems.