Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 13 Feb 1997 23:50:51 -0700
From:      Warner Losh <imp@village.org>
To:        Vadim Kolontsov <vadim@tversu.ac.ru>
Cc:        freebsd-security@freebsd.org
Subject:   Re: new bugs with strcpy() 
Message-ID:  <E0vvHTv-000254-00@rover.village.org>
In-Reply-To: Your message of "Wed, 12 Feb 1997 12:51:56 %2B0300." <Pine.NEB.3.95.970212122850.18936A-100000@mailserv.tversu.ac.ru> 
References:  <Pine.NEB.3.95.970212122850.18936A-100000@mailserv.tversu.ac.ru>  

index | next in thread | previous in thread | raw e-mail

In message <Pine.NEB.3.95.970212122850.18936A-100000@mailserv.tversu.ac.ru> Vadim Kolontsov writes:
:   For example, 
: 	static char pathname[MAXPATHLEN];
: 			sprintf(pathname, "%s/%s", dirp->name, filename);
: }
:   
:   (of course, tftpd runs as nobody by default, but when you'll get
: access to the system you can use another exploit...)

And you are overflowing a static buffer which is *MUCH* harder to
exploit than the stack overflows that we've read so much about.

None the less, I'll be committing a fix for this at some point soon.
Can't be too careful :-)

:   It looks that we need to check whole source tree carefully..
:   Or at least apply patches to libc's strcpy() that checks stack frame.

Yes.  That's true.  Such an effort is going on.

Thanks for pointing out possible problems...

Warner


home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E0vvHTv-000254-00>