Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 93351 - dev-embedded/picasm: Remote Buffer Overflow
Summary: dev-embedded/picasm: Remote Buffer Overflow
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Other
: High normal (vote)
Assignee: Gentoo Security
URL: http://securityfocus.com/bid/13698
Whiteboard: B? [noglsa] formula7
Keywords:
Depends on:
Blocks:
 
Reported: 2005-05-20 11:09 UTC by Jean-François Brunette (RETIRED)
Modified: 2005-05-30 08:16 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jean-François Brunette (RETIRED) gentoo-dev 2005-05-20 11:09:40 UTC
Picasm is affected by a remote buffer overflow vulnerability.

An attacker can exploit this issue by supplying an excessive 'error' directive.

If successfully exploited, this issue can allow a remote attacker to gain access to the affected computer in the context of the user running the application.

Picasm 1.12b and prior versions are vulnerable to this issue.
Comment 1 Jean-François Brunette (RETIRED) gentoo-dev 2005-05-20 11:54:17 UTC
dragonheart, please bump to 1.12c

http://www.co.jyu.fi/~trossi/pic/




Comment 2 Daniel Black (RETIRED) gentoo-dev 2005-05-20 16:49:11 UTC
added and stable. 
Comment 3 Jean-François Brunette (RETIRED) gentoo-dev 2005-05-20 17:44:09 UTC
Thanks dragonheart.

Security members, time to vote if we should issue a GLSA
(because this vulnerability is similar to the nasm one)
Comment 4 Thierry Carrez (RETIRED) gentoo-dev 2005-05-21 02:11:14 UTC
I would class it in the same vein as NASM : the exploit profile looks a little
too unlikely to me, and exploit is in a readable source file. So I tend to vote
NO the same.

The only thing bothering me is that every other distribution issued advisories
on NASM and we'll probably have to deal with questions about it soon.
Comment 5 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-05-30 08:14:03 UTC
Voting a full NO, this seems tricky to exploit. 
Comment 6 Thierry Carrez (RETIRED) gentoo-dev 2005-05-30 08:16:56 UTC
Then we are done.