[23933] in bugtraq
Re: remote buffer overflow in sniffit
daemon@ATHENA.MIT.EDU (Edwin Groothuis)
Tue Jan 22 12:09:41 2002
Date: Tue, 22 Jan 2002 16:33:00 +1100
From: Edwin Groothuis <edwin@mavetju.org>
To: g_463@hotmail.com
Cc: bugtraq@securityfocus.com
Message-ID: <20020122163300.A889@k7.mavetju.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20020119185703.25304.qmail@mail.securityfocus.com>; from g_463@hotmail.com on Sat, Jan 19, 2002 at 06:57:03PM -0000
On Sat, Jan 19, 2002 at 06:57:03PM -0000, g_463@hotmail.com wrote:
> Remote overflow in sniffit.0.3.7.beta
> tested on slackware 7.1
> found/coded by g463
> -18th january 2002-
For what it's worth, this problem is fixed with:
PATCH_SITES= http://ftp.debian.org/debian/dists/stable/main/source/net/
PATCHFILES= sniffit_0.3.7.beta-6.1.diff.gz
From the change-log:
sniffit (0.3.7.beta-6.1) frozen unstable; urgency=high
* Non maintainer upload.
* [security] sn_logfile.c: Replaced sprintfs by snprintfs fixing a buffer
overflow (bugtraq).
* [security] sn_analyse.c: Limit length of TCP packets to the buffer
size (buffer overflow with MTU > 5000).
-- Torsten Landschoff <torsten@debian.org> Fri, 26 May 2000 08:40:14 +0200
I assume Debian patches this, the FreeBSD port also applies these patches.
Edwin
--
Edwin Groothuis | Personal website: http://www.MavEtJu.org
edwin@mavetju.org | Interested in MUDs? Visit Fatal Dimensions:
------------------+ http://www.FatalDimensions.org/