[Home]

Summary:ASTERISK-06730: Possible Integer overflow
Reporter:manos (manos)Labels:
Date Opened:2006-04-07 14:55:10Date Closed:2006-04-07 17:11:48
Priority:MajorRegression?No
Status:Closed/CompleteComponents:Core/CodecInterface
Versions:Frequency of
Occurrence
Related
Issues:
Environment:Attachments:
Description:In format_jpeg.c, there is a possible Integer overflow bug at line 00058, if len is large enough can turn to negative and bypass the if (len > sizeof(buf))  statement, the unsigned version of len will be passed to read(fd, buf, len); and may cause Buffer Overflow -

http://www.asterisk.org/doxygen/format__jpeg_8c-source.html

****** ADDITIONAL INFORMATION ******

FIX : add this in the if statement (| len < 0)  or/and make len unsigned
Comments:By: Olle Johansson (oej) 2006-04-07 16:33:02

Any reason for making this report private?

By: manos (manos) 2006-04-07 17:00:49

Mistake I guess

By: Tilghman Lesher (tilghman) 2006-04-07 17:11:48

Committed to 1.2, merged to trunk.