[12466] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Overflow in tcplog.c (VD#3)

daemon@ATHENA.MIT.EDU (CyberPsychotic)
Sat Nov 6 17:22:16 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.LNX.4.10.9911042044380.433-100000@mad.unix.kg>
Date:         Thu, 4 Nov 1999 20:49:31 +0500
Reply-To: CyberPsychotic <fygrave@SCORPIONS.NET>
From: CyberPsychotic <fygrave@SCORPIONS.NET>
X-To:         Blue Boar <BlueBoar@THIEVCO.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <3823DCFC.10CAD447@thievco.com>

~ :I was just visiting  http://www.echelon.wiretapped.net and downloaded a
~ :small file called "tcplog.c" with no author or version stated.  It is for
~ :logging connections to your box (linux only).
~ :
~ :There are some minor coding gripes I could make, but line 107
~ :takes a risk with the size of a hostname
~ :
~ :    98  char *hostlookup(unsigned long int in)
~ :    99  {

Yep. I have notified phroid about the problem about a year ago or so,
while was adding some additional features to his code, and he told me he
took care of the problem. I also have added several other features to his
code (and fixed the bug of course). If intersted, you could check the code
out at http://www.kalug.lug.net/tcplogd/.

hope it helps.

Fyodor

--
* Some day this will be a full-fledged user tracking system..
- <linux/sched.h>
			http://www.kalug.lug.net/fygrave/

home help back first fref pref prev next nref lref last post