Package: swath
Version: 0.4.0-4

Buffer overflow because of strcpy with possibility to inject shellcode:

swath mule -b [More than 20 to overflow and possibly inject shellcode.] <
emptyfile

proplematic lines are:

char stopstr[20];
  if (muleMode)
    strcpy(stopstr,wbr);

Instead, you should change the size of stopstr according to wbr.
Even better would be simply to change the address of stopstr like

char stopstr[20];
  if (muleMode)
    stopstr = wbr;

-- System Information:
Debian Release: 6.0.6
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'proposed-updates'), (500,
'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/1 CPU core)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages swath depends on:
ii  libc6                         2.11.3-4   Embedded GNU C Library: Shared
lib
ii  libdatrie1                    0.2.4-1    Double-array trie library
ii  libgcc1                       1:4.4.5-8  GCC support library
ii  libstdc++6                    4.4.5-8    The GNU Standard C++ Library v3

swath recommends no packages.

swath suggests no packages.

-- no debconf information

Reply via email to