First published: Tue May 05 2009(Updated: )
A stack-based buffer overflow existed in cscope's putstring function in cscope's versions prior to 15.6. A long function or symbol name in source code file could result in cscope crash or code execution when searching the source code for any function or symbol name. Issue was originally reported via <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED CURRENTRELEASE - cscope stack smashing" href="show_bug.cgi?id=189666">bug #189666</a>, it can be reproduced using memcheck/tests/match-overrun.c from valgrind source tarball. In cscope 15.6, putstring was replaced with function fetch_string_from_dbase, which accepts target buffer size as its argument. Upstream commit: <a href="http://cscope.cvs.sourceforge.net/viewvc/cscope/cscope/src/find.c?view=log#rev1.19">http://cscope.cvs.sourceforge.net/viewvc/cscope/cscope/src/find.c?view=log#rev1.19</a> Patch, which was used in Fedora cscope packages and is used in cscope packages in Red Hat Enterprise Linux 5: <a href="http://cvs.fedoraproject.org/viewvc/rpms/cscope/devel/cscope-15.5-putstring-overflow.patch">http://cvs.fedoraproject.org/viewvc/rpms/cscope/devel/cscope-15.5-putstring-overflow.patch</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Cscope | <15.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-499174 is a critical vulnerability due to stack-based buffer overflow that can lead to application crash or potential code execution.
To fix REDHAT-BUG-499174, upgrade cscope to version 15.6 or later.
REDHAT-BUG-499174 is caused by a stack-based buffer overflow in the putstring function of cscope when handling long function or symbol names.
Versions of cscope prior to 15.6 are affected by REDHAT-BUG-499174.
The potential impacts of REDHAT-BUG-499174 include software crashes and remote code execution vulnerabilities.