tightvncpasswd crashes

Bug #1597115 reported by stsp
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
tightvnc (Ubuntu)
New
Undecided
Unassigned

Bug Description

$ lsb_release -rd
Description: Ubuntu 16.04 LTS
Release: 16.04

$ tightvncpasswd
Using password file /home/pa/.vnc/passwd
Password:
Verify:
Would you like to enter a view-only password (y/n)? n
*** buffer overflow detected ***: tightvncpasswd terminated
======= Backtrace: =========
/lib/i386-linux-gnu/libc.so.6(+0x67257)[0xb7595257]
/lib/i386-linux-gnu/libc.so.6(__fortify_fail+0x68)[0xb76257c8]
/lib/i386-linux-gnu/libc.so.6(+0xf59b8)[0xb76239b8]
tightvncpasswd[0x8048cac]
/lib/i386-linux-gnu/libc.so.6(__libc_start_main+0xf7)[0xb7546637]
tightvncpasswd[0x8048ec3]
======= Memory map: ========
08048000-0804b000 r-xp 00000000 08:01 11283419 /usr/bin/tightvncpasswd
0804b000-0804c000 r--p 00002000 08:01 11283419 /usr/bin/tightvncpasswd
0804c000-0804d000 rw-p 00003000 08:01 11283419 /usr/bin/tightvncpasswd

Of course when we store the password, we have a
buffer overflow - how else. :)

I installed the dbgsym package and run under valgrind:

Using password file /home/pa/.vnc/passwd
Password:
Verify:
Would you like to enter a view-only password (y/n)? n
==7157== Conditional jump or move depends on uninitialised value(s)
==7157== at 0x403037B: strlen (in /usr/lib/valgrind/vgpreload_memcheck-x86-linux.so)
==7157== by 0x8048C9D: main (vncpasswd.c:139)
==7157== Uninitialised value was created by a stack allocation
==7157== at 0x8048A21: main (vncpasswd.c:46)

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.