Re: remote buffer overflow in sniffit

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



>Date: Tue, 22 Jan 2002 16:33:00 +1100
>From: Edwin Groothuis <edwin@mavetju.org>
>To: g_463@hotmail.com
>Cc: bugtraq@securityfocus.com
>Subject: Re: remote buffer overflow in sniffit

[snip]

>  * Non maintainer upload.
>  * [security] sn_logfile.c: Replaced sprintfs by snprintfs fixing a buffer
>    overflow (bugtraq).
>  * [security] sn_analyse.c: Limit length of TCP packets to the buffer
>    size (buffer overflow with MTU > 5000).
>
> -- Torsten Landschoff <torsten@debian.org>  Fri, 26 May 2000 08:40:14 +0200
>
>I assume Debian patches this, the FreeBSD port also applies these patches.
>
>Edwin

The OpenBSD port applies this patch too.

revision 1.9
date: 2000/08/30 23:50:29;  author: brad;  state: Exp;  lines: +13 -15
upgrade to sniffit 0.3.7beta + Debian patches

// Brad

brad@comstyle.com
brad@openbsd.org


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux