A stack-based buffer overflow vulnerability exists in the libelf tool gmo2msg, triggered by overly long filename arguments. This flaw could lead to crashes or potential code execution, especially in privileged contexts. #libelf #gmo2msg
Keypoints
- The vulnerability is caused by unvalidated input length in the gmo2msg program.
- A long filename argument (~1200 bytes) triggers a buffer overflow in the function based on sprintf usage.
- Executing in privileged or less-secure environments increases the risk of successful exploitation.
- Memory corruption from the overflow could be used in multi-stage attack chains.
- A proof-of-concept demonstrates crashing the program via a crafted long argument.