-
Notifications
You must be signed in to change notification settings - Fork 54
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Potential Security Issues #81
Comments
Could you please put the issues here on Github? Also, this repository is no longer actively supported- the new version is split among three repositories: https://github.com/ValleyBell/libvgm, https://github.com/ValleyBell/vgmplay-libvgm, https://github.com/ValleyBell/in_vgm-libvgm |
The owner of this repository must log into the above site with the requisite Github account to even see the reports. The discloser receives a bounty for each valid bug report. Apparently paid by that site for any arbitrary person who reports a so-called "0 day" against any Github repository. |
This is spam. |
https://huntr.dev/bounties/1-other-vgmrips/vgmplay/ ✍️ DescriptionHi, environement variables are copied into buffers using int main(int argc, char* argv[])
{
int argbase;
int ErrRet;
char* AppName;
/**/
char* AppPathPtr;
const char* StrPtr;
/**/
/**/
#ifndef WIN32
// Path 3: home directory
StrPtr = getenv("XDG_CONFIG_HOME");
if (StrPtr != NULL && StrPtr[0] == '\0')
{
strcpy(AppPathPtr, StrPtr);//env variable XDG_CONFIG_HOME is copied using strcpy
}
else
{
StrPtr = getenv("HOME");
if (StrPtr != NULL)
strcpy(AppPathPtr, StrPtr);//env variable HOME is copied using strcpy
else
strcpy(AppPathPtr, "");
strcat(AppPathPtr, "/.config");
}
/**/
#endif
} 🕵️♂️ Proof of ConceptExport a sufficiently long 💥 ImpactCrash, code execution for local attackers who have access to a local shell |
https://huntr.dev/bounties/2-other-vgmrips/vgmplay/ ✍️ DescriptionHi, a buffer overflow was found in The executable char VgmFileName[MAX_PATH];
/**/
int main(int argc, char* argv[])
{
int argbase;
/**/
char* DispFileName;
/**/
argbase = 0x01;
/**/
printf("\nFile Name:\t");
if (argc <= argbase)//if 0 arguments are passed to the programs execute this branch
{
/**/
}
else
{
// The argument should already use the ANSI codepage.
strcpy(VgmFileName, argv[argbase]);//copy argv[1] into .bss based VgmFileName variable
DispFileName = GetLastDirSeparator(VgmFileName);
if(DispFileName && strlen(DispFileName) > 2)
DispFileName++;
else
DispFileName = VgmFileName;
printf("%s\n", DispFileName);
}
} The program copies 🕵️♂️ Proof of ConceptTo trigger the segmentation fault run the following command : Without the 💥 ImpactSegfault, code execution if successfully exploited |
@superctr - I have attached both reports above for you. Let me know what you think. Cheers! 🍰 |
Hello,
We recently received multiple vulnerability disclosures against your repository. I couldn't find an e-mail to contact or a security process to follow, so created this issue instead.
If you would like me to e-mail over the details or put them on the GitHub Issue, I'm more than happy to facilitate this for you. Otherwise, you can access the advisories here and here.
It is private to you and the discloser of the report.
If you have any questions, let me know.
-- Jamie from huntr.dev
The text was updated successfully, but these errors were encountered: