Mehdi Oudad and Kevin Fernandez have reported a vulnerability in ktools, which has an unknown impact.
The vulnerability is caused due to a boundary error in the "VGETSTRING()" macro when generating the output string using the "vsprintf()" function. This can be exploited to cause a stack-based buffer overflow via an overly long input string.
The vulnerability has been reported in version 0.3. Other versions may also be affected.
Note: All applications that use the Ktools library to create text-mode user interfaces are potentially affected. The actual impact depends on whether the application uses any external data sources to populate the treeview or the verticalmenu control.
Solution: Restrict use of affected applications to only accept input from trusted sources.
Provided and/or discovered by: Mehdi Oudad "deepfear" and Kevin Fernandez "Siegfried", Zone-H Research Team.
Original Advisory: http://www.zone-h.org/en/advisories/read/id=8480/
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org