Full Disclosure: libelf 0.8.12 Stack-based buffer overflow in gmo2msg (libelf) via unbounded sprintf of lang argument

Full Disclosure: libelf 0.8.12 Stack-based buffer overflow in gmo2msg (libelf) via unbounded sprintf of lang argument

A stack-based buffer overflow vulnerability exists in the libelf tool gmo2msg, triggered by overly long filename arguments. This flaw could lead to crashes or potential code execution, especially in privileged contexts. #libelf #gmo2msg

Keypoints

  • The vulnerability is caused by unvalidated input length in the gmo2msg program.
  • A long filename argument (~1200 bytes) triggers a buffer overflow in the function based on sprintf usage.
  • Executing in privileged or less-secure environments increases the risk of successful exploitation.
  • Memory corruption from the overflow could be used in multi-stage attack chains.
  • A proof-of-concept demonstrates crashing the program via a crafted long argument.

Read More: https://seclists.org/fulldisclosure/2025/Sep/64