Depends on your malloc() implementation. The thing that causes the bug
to appear is an input stream constructed *just* *so*, and that *is*
platform independent as the inflate input stream is the same regardless
of platform. Bad things happen when malloc()/free() from libc is also
faulty or fails in a certain way upon a double free. The best you can
hope for is a segv, still a downer for the user. 

Most libc's are related - I wouldn't be surprised if MacOS X's malloc is
related to BSD or gnu's libc. But it also depends on your compiler - if
Metrowerks have a compiler suite for MacOS X that's not the heavily
modified gcc that Apple supply, then that could be a dependency. 

Suffice to say, it's simpler to re-link with zlib 1.1.4 than to figure
out if you're actually vulnerable to the input stream. 

Andrew

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]] On Behalf Of Adrian Umpleby
Sent: Thursday, 14 March 2002 8:14 PM
To: [EMAIL PROTECTED]
Subject: Re: VNC zlib Advisory draft 1

>The next version of VNCThing (2.3) will be linked with zlib 1.1.4:
should be
>available fairly soon.

Thanks for the info!

(Does that mean v2.2 is potentially vulnerable?)

Adrian
---------------------------------------------------------------------
To unsubscribe, mail [EMAIL PROTECTED] with the line:
'unsubscribe vnc-list' in the message BODY
See also: http://www.uk.research.att.com/vnc/intouch.html
---------------------------------------------------------------------
---------------------------------------------------------------------
To unsubscribe, mail [EMAIL PROTECTED] with the line:
'unsubscribe vnc-list' in the message BODY
See also: http://www.uk.research.att.com/vnc/intouch.html
---------------------------------------------------------------------

Reply via email to