tags patch
thanks

It appears that the remote buffer overflow vulnerability can be
averted with a simple change to main.c:922.  Use vsnprintf to cap the
size to (sizeof p).

Note that the original report mentions format string vulnerabilities
as well.  Indeed, this same function, message(), is vulnerable, since
a remote server may control the string argument.

This problem could be solved by escaping escape sequences (especially
% ones).  At least the following are remotely controllable by
mallicious entities:

  remote file name
  ftp directories
  hostnames

Others such as the username should also be escaped for correctness.

Justin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to