[6721] in bugtraq

home help back first fref pref prev next nref lref last post

Overflows in minicom

daemon@ATHENA.MIT.EDU (Tiago F P Rodrigues)
Sun May 10 15:28:00 1998

Date: 	Sat, 9 May 1998 21:48:55 +0200
Reply-To: Tiago F P Rodrigues <11108496@LIS.ULUSIADA.PT>
From: Tiago F P Rodrigues <11108496@LIS.ULUSIADA.PT>
To: BUGTRAQ@NETSPACE.ORG

 I apologise if this is old, though i haven=B4t found any message on th=
is
issue on bugtraq in the last few months.

 It seems minicom(distributed with slak3.4) have some overflow
vulnerabilities, namely in the '-p' switch and when you pick a config
file on the arguments. (a strcpy and a sprintf)

 you may test it with:
  $ minicom -p/dev/ttyp`perl -e =B4print "A" x 2500=B4`
    (Some garbage)
    Segmentation fault

 An examination under gdb shows saved EIP=3D0x414141
 If this is new, I may post an exploit if prompted to.

-----------------------------------------------------------------------=
------
"There are awfull penalties for crimes against the gods"
                                        - Irish Murdoch
Tiago F. P. Rodrigues   (BlindPoet)
Universidade Lusiada =B498 - PORTUGAL
-----------------------------------------------------------------------=
------

home help back first fref pref prev next nref lref last post