Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 871187 - (CVE-2012-4552) CVE-2012-4552 plib: stack-based buffer overflow in the error function in ssg/ssgParser.cxx
CVE-2012-4552 plib: stack-based buffer overflow in the error function in ssg/...
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 871188
  Show dependency treegraph
Reported: 2012-10-29 17:00 EDT by Vincent Danen
Modified: 2016-03-04 07:10 EST (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2012-12-20 12:53:07 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2012-10-29 17:00:21 EDT
A stack-based buffer overflow flaw was reported [1] in how plib handles errors when loading 3d model files as X (Direct X), ASC, ASE, ATG, and OFF.  The description of the flaw follows:

Vulnerability Details: Plib is prone to stack based Buffer overflow in the
error function in ssg/ssgParser.cxx when it loads 3d model files as X
(Direct x), ASC, ASE, ATG, and OFF, if a very long error message is passed
to the function, in line 68:

// Output an error
void _ssgParser::error( const char *format, ... )
  char msgbuff[ 255 ];
  va_list argp;

  char* msgptr = msgbuff;
  if (linenum)
    msgptr += sprintf ( msgptr,"%s, line %d: ",
      path, linenum );

  va_start( argp, format );
68        vsprintf( msgptr, format, argp );
  va_end( argp );

  ulSetError ( UL_WARNING, "%s", msgbuff ) ;

I'm unsure whether or not this was reported upstream (there is no relevant bugs, and the last commit to ssgParser.cxx [2] was five years ago).

[1] http://www.openwall.com/lists/oss-security/2012/10/29/8
[2] http://plib.svn.sourceforge.net/viewvc/plib/trunk/src/ssg/ssgParser.cxx?view=log
Comment 1 Vincent Danen 2012-10-29 17:01:27 EDT
Created plib tracking bugs for this issue

Affects: fedora-all [bug 871188]
Comment 2 Vincent Danen 2012-10-31 14:31:01 EDT
plib is no longer being maintained upstream:


This likely means we should determine whether or not we want to keep this package in Fedora, or what other upstream projects (like FlightGear) are going to do about this lack of maintenance.  Unfortunately this means we will need to come up with our own patch to fix this flaw.

Note You need to log in before you can comment on or make changes to this bug.