-
-
Notifications
You must be signed in to change notification settings - Fork 84
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Crashfix: maskname() buffer size #1435
Conversation
@michaelortmann Does this represent a potential remote buffer overflow vulnerability? |
@attritionorg No. console flags are not shared between bots. Also this buffer overflow, as bad as it always is, is limited in size (6 bytes) and content (no user defined input). so exploiting this would really be a local DOS only. The user must be authorized / connected to the bot. As in #1434 it often wont crash the bot. The crash here was caused by additional compiler flags |
Excellent, thanks for the quick response! |
Let's just make this 1024 and be done with it? |
currently buf size is 281, so lets make it 512? |
This comment was marked as outdated.
This comment was marked as outdated.
|
Also while cleaning up similar code in eggdrop i found and fixed a bug regarding status report for channel setting revengebot. Test:
Before:
After:
|
Found by: jack3?
Patch by: michaelortmann
Fixes: #1434
One-line summary:
Fix maskname() buffer size
Additional description (if needed):
Bug since eggdrop 1.9.0rc1 842ef44
Test cases demonstrating functionality (if applicable):