A vulnerability was found in MCPP 2.7.2 has a heap-based buffer overflow in the do_msg() function in
Created mcpp tracking bugs for this issue:
Affects: fedora-all [bug 1740465]
When mcpp application found multibyte characters when parsing the input file, it tries to show warning messages. The messages are shown via cwarn() function which further calls do_msg() with the error message itself formatted in printf-like format. The buffer containing the multibyte sequence is also passed as parameter for do_msg() which doesn't handle it gracefully. This causes a buffer overflow to happening during the output message formation, the overflow may cause low integrity and confidentiality impacts and eventually may lead to invalid memory access causing DoS.