Package: xemacs21
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for xemacs21.

CVE-2007-6109[0]:
| Stack-based buffer overflow in emacs allows user-assisted attackers to
| cause a denial of service (application crash) and possibly have
| unspecified other impact via a large precision value in an integer
| format string specifier to the format function, as demonstrated via a
| certain "emacs -batch -eval" command line.

We believed that xemacs21 is unaffected by this first but it 
turned out (Thanks to Florian) that it actually is but at a 
differen place:
src/doprnt.c:

              /* Mostly reconstruct the spec and use sprintf() to
                 format the string. */

              *p++ = '%';
              if (spec->plus_flag)   *p++ = '+';
              if (spec->space_flag)  *p++ = ' ';
              if (spec->number_flag) *p++ = '#';
              if (spec->minus_flag)  *p++ = '-';
              if (spec->zero_flag)   *p++ = '0';

              if (spec->minwidth >= 0)
                p = long_to_string (p, spec->minwidth);
              if (spec->precision >= 0)
                {
                  *p++ = '.';
                  p = long_to_string (p, spec->precision);
                }

              if (strchr (double_converters, ch))
                {
                  *p++ = ch;
                  *p++ = '\0';
                  sprintf (text_to_print, constructed_spec, arg.d);
                }
              else
                {
                  *p++ = 'l';   /* Always use longs with sprintf() */
                  *p++ = ch;
                  *p++ = '\0';

                  if (strchr (unsigned_int_converters, ch))
                    sprintf (text_to_print, constructed_spec, arg.ul);
                  else
                    sprintf (text_to_print, constructed_spec, arg.l);
                }

If you fix this vulnerability please also include the CVE id
in your changelog entry.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6109

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgp2wrjPeYIe3.pgp
Description: PGP signature

Reply via email to