Debian: 2071-1: libmikmod: buffer overflows


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Debian: 2071-1: libmikmod: buffer overflows
# 1  
Old 07-15-2010
Debian: 2071-1: libmikmod: buffer overflows

LinuxSecurity.com: Dyon Balding discovered buffer overflows in the MikMod sound library, which could lead to the execution of arbitrary code if a user is tricked into opening malformed Impulse Tracker or Ultratracker sound files. [More...]

More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
getauduser(3)						     Library Functions Manual						     getauduser(3)

NAME
getauduser - retrieve the accountable user for the current process SYNOPSIS
DESCRIPTION
retrieves the accountable user for the current process and saves the information into the buffer pointed to by user. It also retrieves the time of authentication and saves it into the buffer pointed to by stime, if the information is available. Caller must set usize and tsize to the size of the user and the stime buffers. Note that the two buffers are always null terminated, even if it results in loss of some data. Programs using this routine must be compiled with Security Restrictions This call requires the user be superuser or possess privilege. See privileges(5) for details. RETURN VALUE
returns the following values: n Successful completion. n is the length of the retrieved login name, excluding the null byte. If n is less than usize, the login name is retrieved without truncation. Otherwise, usize -1 bytes of login name are copied into user, and user is null terminated. The caller needs to retry with a larger buffer. Failure. is set to indicate the error. ERRORS
If fails, is set to one of the following values: The caller is not a superuser or a privileged process. The size of stime buffer is smaller than See Unrecognized EXAMPLES
AUTHOR
was developed by HP. The return values and null padding semantics for this system call are chosen such that a chance for buffer overflows in a C program is min- imized. These semantics were inspired by of C99 and and as they appeared in OpenBSD. SEE ALSO
getaudid(2), setaudid(2), setauduser(3), audit(5), privileges(5). getauduser(3)