[23933] in bugtraq

home help back first fref pref prev next nref lref last post

Re: remote buffer overflow in sniffit

daemon@ATHENA.MIT.EDU (Edwin Groothuis)
Tue Jan 22 12:09:41 2002

Date: Tue, 22 Jan 2002 16:33:00 +1100
From: Edwin Groothuis <edwin@mavetju.org>
To: g_463@hotmail.com
Cc: bugtraq@securityfocus.com
Message-ID: <20020122163300.A889@k7.mavetju.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20020119185703.25304.qmail@mail.securityfocus.com>; from g_463@hotmail.com on Sat, Jan 19, 2002 at 06:57:03PM -0000

On Sat, Jan 19, 2002 at 06:57:03PM -0000, g_463@hotmail.com wrote:
>    Remote overflow in sniffit.0.3.7.beta 
>    tested on slackware 7.1
>    found/coded by g463
>    -18th january 2002-

For what it's worth, this problem is fixed with:

PATCH_SITES=    http://ftp.debian.org/debian/dists/stable/main/source/net/
PATCHFILES=     sniffit_0.3.7.beta-6.1.diff.gz

From the change-log:
sniffit (0.3.7.beta-6.1) frozen unstable; urgency=high

  * Non maintainer upload.
  * [security] sn_logfile.c: Replaced sprintfs by snprintfs fixing a buffer 
    overflow (bugtraq).
  * [security] sn_analyse.c: Limit length of TCP packets to the buffer 
    size (buffer overflow with MTU > 5000).

 -- Torsten Landschoff <torsten@debian.org>  Fri, 26 May 2000 08:40:14 +0200

I assume Debian patches this, the FreeBSD port also applies these patches.

Edwin

-- 
Edwin Groothuis   |              Personal website: http://www.MavEtJu.org
edwin@mavetju.org |           Interested in MUDs? Visit Fatal Dimensions:
------------------+                       http://www.FatalDimensions.org/

home help back first fref pref prev next nref lref last post