[asterisk-bugs] [LibSS7 0014676]: buffer overflow in mtp2_new

Asterisk Bug Tracker noreply at bugs.digium.com
Mon Mar 16 11:42:57 CDT 2009


A NOTE has been added to this issue. 
====================================================================== 
http://bugs.digium.com/view.php?id=14676 
====================================================================== 
Reported By:                Safari
Assigned To:                mattf
====================================================================== 
Project:                    LibSS7
Issue ID:                   14676
Category:                   General
Reproducibility:            N/A
Severity:                   major
Priority:                   normal
Status:                     assigned
Asterisk Version:           SVN 
SVN Branch (only for SVN checkouts, not tarball releases):  trunk 
SVN Revision (number only!):  
Disclaimer on File?:        N/A 
Request Review:              
====================================================================== 
Date Submitted:             2009-03-16 11:38 CDT
Last Modified:              2009-03-16 11:42 CDT
====================================================================== 
Summary:                    buffer overflow in mtp2_new
Description: 
new->name[sizeof(new->name)] = 0;
overflows the buffer, overwriting part of `state'.

====================================================================== 

---------------------------------------------------------------------- 
 (0101805) Safari (reporter) - 2009-03-16 11:42
 http://bugs.digium.com/view.php?id=14676#c101805 
---------------------------------------------------------------------- 
Patch is obvious.  I was going to upload it, but I'll skip that because I
don't bother filling your license agreement. 

Issue History 
Date Modified    Username       Field                    Change               
====================================================================== 
2009-03-16 11:42 Safari         Note Added: 0101805                          
======================================================================




More information about the asterisk-bugs mailing list