Partager via


Ya Gotta Larf

A nasty set of security bug fixes by Mandrake in xorg-x11 had the funniest text I've seen in a security bulletin. Ever!

I have highlighted the funny part in red.

https://www.linuxsecurity.com/advisories/mandrake_advisory-5081.html

Problem Description:

Chris Evans found several stack and integer overflows in the libXpm code
of X.Org/XFree86:

Stack overflows (CAN-2004-0687):

Careless use of strcat() in both the XPMv1 and XPMv2/3 xpmParseColors code
leads to a stack based overflow (parse.c).

Stack overflow reading pixel values in ParseAndPutPixels (create.c) as
well as ParsePixels (parse.c).

Integer Overflows (CAN-2004-0688):

Integer overflow allocating colorTable in xpmParseColors (parse.c) -
probably a crashable but not exploitable offence.

:)

An interesting factoid is it's taken Mandrake nearly two months to fix this, relative to the other vendors.

Vendor Fix Date URL
SuSE Sep-17-2004 https://www.suse.com/de/security/2004_34_xfree86_libs_xshared.html
Gentoo Sep-27-2004 https://www.gentoo.org/security/en/glsa/glsa-200409-34.xml
RedHat Oct-04-2004 https://rhn.redhat.com/errata/RHSA-2004-478.html
Mandrake Nov-04-2004    https://www.linuxsecurity.com/advisories/mandrake_advisory-5081.html

The bug also affects IBM's AIX https://www-1.ibm.com/services/continuity/recover1.nsf/mss/MSS-OAR-E01-2004.1484.1 and Sun's Solaris https://sunsolve.sun.com/search/document.do?assetkey=1-26-57653-1&searchclause=