A vulnerability was found in MCPP 2.7.2 has a heap-based buffer overflow in the do_msg() function in support.c. Reference: https://sourceforge.net/p/mcpp/bugs/13/
Created mcpp tracking bugs for this issue: Affects: fedora-all [bug 1740465]
External References: https://sourceforge.net/p/mcpp/bugs/13/
When mcpp application found multibyte characters when parsing the input file, it tries to show warning messages. The messages are shown via cwarn() function which further calls do_msg() with the error message itself formatted in printf-like format. The buffer containing the multibyte sequence is also passed as parameter for do_msg() which doesn't handle it gracefully. This causes a buffer overflow to happening during the output message formation, the overflow may cause low integrity and confidentiality impacts and eventually may lead to invalid memory access causing DoS.