Bug 871187 (CVE-2012-4552) - CVE-2012-4552 plib: stack-based buffer overflow in the error function in ssg/ssgParser.cxx
Summary: CVE-2012-4552 plib: stack-based buffer overflow in the error function in ssg/...
Alias: CVE-2012-4552
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 871188
TreeView+ depends on / blocked
Reported: 2012-10-29 21:00 UTC by Vincent Danen
Modified: 2019-09-29 12:56 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2012-12-20 17:53:07 UTC

Attachments (Terms of Use)

Description Vincent Danen 2012-10-29 21:00:21 UTC
A stack-based buffer overflow flaw was reported [1] in how plib handles errors when loading 3d model files as X (Direct X), ASC, ASE, ATG, and OFF.  The description of the flaw follows:

Vulnerability Details: Plib is prone to stack based Buffer overflow in the
error function in ssg/ssgParser.cxx when it loads 3d model files as X
(Direct x), ASC, ASE, ATG, and OFF, if a very long error message is passed
to the function, in line 68:

// Output an error
void _ssgParser::error( const char *format, ... )
  char msgbuff[ 255 ];
  va_list argp;

  char* msgptr = msgbuff;
  if (linenum)
    msgptr += sprintf ( msgptr,"%s, line %d: ",
      path, linenum );

  va_start( argp, format );
68        vsprintf( msgptr, format, argp );
  va_end( argp );

  ulSetError ( UL_WARNING, "%s", msgbuff ) ;

I'm unsure whether or not this was reported upstream (there is no relevant bugs, and the last commit to ssgParser.cxx [2] was five years ago).

[1] http://www.openwall.com/lists/oss-security/2012/10/29/8
[2] http://plib.svn.sourceforge.net/viewvc/plib/trunk/src/ssg/ssgParser.cxx?view=log

Comment 1 Vincent Danen 2012-10-29 21:01:27 UTC
Created plib tracking bugs for this issue

Affects: fedora-all [bug 871188]

Comment 2 Vincent Danen 2012-10-31 18:31:01 UTC
plib is no longer being maintained upstream:


This likely means we should determine whether or not we want to keep this package in Fedora, or what other upstream projects (like FlightGear) are going to do about this lack of maintenance.  Unfortunately this means we will need to come up with our own patch to fix this flaw.

Note You need to log in before you can comment on or make changes to this bug.