[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: Re: [RHSA-1999:017-01] Potential security problem in Red Hat 6.0
From: David Wagner <daw () CS ! BERKELEY ! EDU>
Date: 1999-07-12 1:54:36
[Download RAW message or body]
In article <m3iu8coudx.fsf@soma.andreas.org>,
Andreas Bogk <andreas@ANDREAS.ORG> wrote:
> Raymond Dijkxhoorn <raymond@THRIJSWIJK.NL> writes:
>
> > 7. Problem description:
> >
> > Several potential buffer overruns have been corrected within the net-tools
> > package.
>
> Could someone from RedHat please identify the programs in
> question, their version numbers, the history of the code or something
> else which allows me to find out whether I'm affected or not?
>
I'm not from RedHat. But maybe I can try to help a little, since I think I
was the one who reported these vulnerabilities.
I think the problem is present in nettools-1.52 and prior versions. There
were a number of buffer overruns. To see an example of one, try grepping for
strcpy in lib/inet.c; if you see something like ``strcpy(name, hp->h_name);''
you might have the vulnerable version; if you see lots of safe_strncpy()'s,
you probably have the safe version. (I think.)
Maybe this is enough to get you started.
But please take this with a grain of salt. I am an outsider. For official
answers, you'd do better to ask RedHat or the code maintainers.
Credits: These buffer overruns were found with the help of an automated code
auditing tool which was developed in collaboration with Jeff Foster, Eric
Brewer, and Alex Aiken (also at Berkeley).
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic