Adriano Lima has reported multiple vulnerabilities in LCDProc, which can be exploited by malicious people to compromise a vulnerable system.
1) A boundary error exists within the "parse_all_client_messages()" function in LCDd. This can be exploited to cause a buffer overflow and execute arbitrary code via some specially crafted messages.
This reportedly affects version 0.4.4 and prior.
2) Another boundary error within the "parse_all_client_messages()" function in LCDd can also be exploited to cause a buffer overflow and execute arbitrary code on a vulnerable system by passing an invalid command.
3+4) A boundary error within the "test_func_func()" function can be exploited to cause a buffer overflow and execute arbitrary code by passing an overly long string.
A format string error exists within the same function and can be exploited by passing a specially crafted argument containing format specifiers.
Issues 2, 3, and 4 reportedly affect version 0.4.1 and prior.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: LCDProc Multiple System Compromise Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.