Package: sshm
Version: 0.4.2-1
Severity: normal
sshm is vulnerable due to uncontrolled format string usage with sscanf. Furthermore a vulnerability caused by unsafe usage of std::cin exists.
Reproduction:
sscanf: create a entry/line in $HOME/.sshm to cause a segfault:
"a b c dddd /* d repeats about 200 times */"
std:cin: Create a new server entry with `sshm --add`. Enter a Hostname/IP longer than aprox. 250 characters. The application will claim, that only 85 characters are allowed. Type random data to finish the add dialog. The program will segfault.
Both vulnerabilities may be used to inject shellcode and therefore execute arbitrary code in a users context.
-- System Information:
Debian Release: 6.0.6
APT prefers stable
APT policy: (500, 'stable')
Architecture: i386 (i686)
Kernel: Linux 2.6.32-5-686 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages sshm depends on:
ii libc6 2.11.3-4 Embedded GNU C Library: Shared lib
ii libgcc1 1:4.4.5-8 GCC support library
ii libstdc++6 4.4.5-8 The GNU Standard C++ Library v3
ii openssh-client 1:5.5p1-6+squeeze2 secure shell (SSH) client, for sec
sshm recommends no packages.
sshm suggests no packages.
-- no debconf information
--
To UNSUBSCRIBE, email to
debian-bugs-...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact
listm...@lists.debian.org