[7808] in bugtraq

home help back first fref pref prev next nref lref last post

Re: buffer overflow in nslookup?

daemon@ATHENA.MIT.EDU (Theo de Raadt)
Mon Aug 31 11:16:07 1998

Date: 	Mon, 31 Aug 1998 01:17:40 -0600
Reply-To: Theo de Raadt <deraadt@CVS.OPENBSD.ORG>
From: Theo de Raadt <deraadt@CVS.OPENBSD.ORG>
X-To:         Benjamin J Stassart <dszd0g@dasb.fhda.edu>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  Your message of "Sun, 30 Aug 1998 20:29:43 PDT." 
              <Pine.OSF.3.95q.980830201713.4574D-100000@octane.dasb.fhda.edu>

> If your nslookup's main.c includes:
>
>     sscanf(string, " %s", host);        /* removes white space */
>
> (at line 681 in 4.9.7-REL and at line 684 in 8.1.2) and it does not
> check the length of 'string', then you are vulnerable.

Nearly all the sscanf's parsing for some varient of %s are possible
vulnerabilities.

The same applies to "dig".

They must all be fixed.

home help back first fref pref prev next nref lref last post