[23934] in bugtraq

home help back first fref pref prev next nref lref last post

Re: remote buffer overflow in sniffit

daemon@ATHENA.MIT.EDU (Brad)
Tue Jan 22 13:49:45 2002

Date: Tue, 22 Jan 2002 12:52:11 -0500 (EST)
From: Brad <brad@comstyle.com>
To: bugtraq@securityfocus.com
In-Reply-To: <20020122163300.A889@k7.mavetju.org>
Message-ID: <Pine.BSO.4.44.0201221244070.14564-100000@ss5.comstyle.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII

>Date: Tue, 22 Jan 2002 16:33:00 +1100
>From: Edwin Groothuis <edwin@mavetju.org>
>To: g_463@hotmail.com
>Cc: bugtraq@securityfocus.com
>Subject: Re: remote buffer overflow in sniffit

[snip]

>  * Non maintainer upload.
>  * [security] sn_logfile.c: Replaced sprintfs by snprintfs fixing a buffer
>    overflow (bugtraq).
>  * [security] sn_analyse.c: Limit length of TCP packets to the buffer
>    size (buffer overflow with MTU > 5000).
>
> -- Torsten Landschoff <torsten@debian.org>  Fri, 26 May 2000 08:40:14 +0200
>
>I assume Debian patches this, the FreeBSD port also applies these patches.
>
>Edwin

The OpenBSD port applies this patch too.

revision 1.9
date: 2000/08/30 23:50:29;  author: brad;  state: Exp;  lines: +13 -15
upgrade to sniffit 0.3.7beta + Debian patches

// Brad

brad@comstyle.com
brad@openbsd.org


home help back first fref pref prev next nref lref last post