Submit #512801: Open Source libzvbi 0.2.43 Integer Overflow -> Heap Overflow (_vbi_strndup_iconv)info

TitleOpen Source libzvbi 0.2.43 Integer Overflow -> Heap Overflow (_vbi_strndup_iconv)
DescriptionThe function _vbi_strndup_iconv has an integer overflow vulnerability that could result in an under allocation and a crash. char *_vbi_strndup_iconv(unsigned long *out_size, const char *dst_codeset,const char *src_codeset, const char * src, unsigned long src_size, int repl_char) { if (same_codeset (dst_codeset, src_codeset)) { return strndup_identity (out_size, src, src_size); } ... } static char *strndup_identity(unsigned long *out_size, const char *src, unsigned long src_size) { char *buffer; buffer = vbi_malloc (src_size + 4); // src_size is user controlled and LONG_MAX + 4 would result in an under allocation if (NULL == buffer) { if (NULL != out_size) *out_size = 0; return NULL; } memcpy (buffer, src, src_size); // copying a greater amount of bytes than the size of the under allocated buffer due to the arithmetic operation in malloc memset (buffer + src_size, 0, 4); if (NULL != out_size) *out_size = src_size; return buffer; }
User ninpwn (UID 82253)
Submission03/03/2025 11:18 AM (12 months ago)
Moderation03/11/2025 07:06 AM (8 days later)
StatusAccepted
VulDB entry299204 [libzvbi up to 0.2.43 _vbi_strndup_iconv integer overflow]
Points17

Might our Artificial Intelligence support you?

Check our Alexa App!