Package: ffproxy
Version: 1.6-10
Severity: normal

ffproxy uses bounds checks along the lines of 'i < sizeof(r->header) - 1'
in several places to bounds-check the array index variable 'i', but
r->header is an array of char* variables, so this is incorrect.

The result is that if the remote side (or the local side, probably?)
provides too many headers, then the stack is overwritten with heap
pointers to the headers in question (since 'r' is on the stack).

The trivial fix would be to replace the 6 uses of sizeof(r->header)
with 32, which is the size of the r->header array (see req.h).

- Alyssa


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to