[15567] in bugtraq

home help back first fref pref prev next nref lref last post

Re: WuFTPD: Providing *remote* root since at least1994

daemon@ATHENA.MIT.EDU (Hudin Lucian)
Fri Jun 30 17:02:26 2000

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.LNX.4.10.10006292303040.14573-100000@wild.transart.ro>
Date:         Thu, 29 Jun 2000 23:30:25 +0300
Reply-To: Hudin Lucian <luci@WILD.TRANSART.RO>
From: Hudin Lucian <luci@WILD.TRANSART.RO>
X-To:         Kenn Humborg <kenn@BLUETREE.IE>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <NBBBIGEGHIGMPCNKHCECIEDADLAA.kenn@bluetree.ie>

Actually many people blame sprintf usage as a potential source
for buffer overflow exploits, yet :

char buff[BUFSIZ];
sprintf(buff, "%.*s", BUFSIZ, "string");

avoids the overflow ... IMHO it's very easy to avoid buffer overflows when
writing critical programs just by keeping in mind the 5th of "the ten C
commandments", just in case you forgot it :

 5. Thou shalt check the array bounds of all strings (indeed, all
arrays), for surely where thou typest "foo" someone someday shall type
"supercalifragilisticexpialidocious".

Regards, LucySoft

home help back first fref pref prev next nref lref last post