[7319] in bugtraq

home help back first fref pref prev next nref lref last post

Re: EMERGENCY: new remote root exploit in UW imapd

daemon@ATHENA.MIT.EDU (Kragen)
Mon Jul 20 22:49:30 1998

Date: 	Fri, 17 Jul 1998 10:14:47 -0400
Reply-To: Kragen <kragen@POBOX.COM>
From: Kragen <kragen@POBOX.COM>
X-To:         Craig Spannring <cts@INTERNETCDS.COM>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <199807170035.RAA05041@bangkok.office.cdsnet.net>

On Thu, 16 Jul 1998, Craig Spannring wrote:
> Anonymous writes:
>  > In some ways, it is depressing to find this new hole.  Programmers are
>  > still making the same mistakes they have made for years.  Doesn't anyone
>  > learn from the past?  Can strcpy() ever be used safely?  Perhaps the
>  > software development community, and certainly those writing network service
>  > daemons that run as root, should discontinue using *any* C library
>
> C should not be used for trusted programs.  The lack of true arrays
> with array bounds checking alone makes it too hazardous.

Many of the people on this list already know this, but there are
experimental bounds-checking extensions to gcc that do exactly what
you're looking for:

The first work I know of on bounds-checking for gcc was done by Richard
W. M. Jones and Paul Kelly, and is at
http://www.doc.ic.ac.uk/~phjk/BoundsChecking.html
Greg McGary <gkm@eng.ascend.com> did some other work.  Announcement:
http://www.cygnus.com/ml/egcs/1998-May/0073.html
Richard Jones and Herman ten Brugge did other work.  Announcement:
http://www.cygnus.com/ml/egcs/1998-May/0557.html
Greg compares different approaches in
http://www.cygnus.com/ml/egcs/1998-May/0559.html

Kragen

home help back first fref pref prev next nref lref last post