[asterisk-bugs] [LibSS7 0014676]: buffer overflow in mtp2_new

Asterisk Bug Tracker noreply at bugs.digium.com
Mon Mar 16 11:38:54 CDT 2009


The following issue has been SUBMITTED. 
====================================================================== 
http://bugs.digium.com/view.php?id=14676 
====================================================================== 
Reported By:                Safari
Assigned To:                mattf
====================================================================== 
Project:                    LibSS7
Issue ID:                   14676
Category:                   General
Reproducibility:            N/A
Severity:                   major
Priority:                   normal
Status:                     assigned
Asterisk Version:           SVN 
SVN Branch (only for SVN checkouts, not tarball releases):  trunk 
SVN Revision (number only!):  
Disclaimer on File?:        N/A 
Request Review:              
====================================================================== 
Date Submitted:             2009-03-16 11:38 CDT
Last Modified:              2009-03-16 11:38 CDT
====================================================================== 
Summary:                    buffer overflow in mtp2_new
Description: 
new->name[sizeof(new->name)] = 0;
overflows the buffer, overwriting part of `state'.

====================================================================== 

Issue History 
Date Modified    Username       Field                    Change               
====================================================================== 
2009-03-16 11:38 Safari         New Issue                                    
2009-03-16 11:38 Safari         Status                   new => assigned     
2009-03-16 11:38 Safari         Assigned To               => mattf           
2009-03-16 11:38 Safari         Asterisk Version          => SVN             
2009-03-16 11:38 Safari         SVN Branch (only for SVN checkouts, not tarball
releases) =>  trunk          
======================================================================




More information about the asterisk-bugs mailing list