Date: Wed, 4 Nov 1998 20:10:00 +1300 (NZDT) From: Andrew McNaughton <andrew@squiz.co.nz> To: Nicholas Charles Brawn <ncb05@uow.edu.au> Cc: Warner Losh <imp@village.org>, FreeBSD-security@FreeBSD.ORG Subject: Re: [rootshell] Security Bulletin #25 (fwd) Message-ID: <Pine.BSF.4.01.9811041946050.780-100000@aniwa.sky> In-Reply-To: <Pine.SOL.4.02A.9811041627410.24210-100000@banshee.cs.uow.edu.au>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 4 Nov 1998, Nicholas Charles Brawn wrote:
> Well I just grabbed 1.2.26 and did:
> find . -exec grep sprintf {} \; |wc -l
>
> And came up with 138 lines. Just having sprintf() in your code is not
> indicative of a vulnerability, but it's still a high number.
ssh is commonly used for piping substantial ammounts of data, and can
probably claim good reasons for using the faster non-bounds-checking
routines in many of these cases. Doesn't apply to low volume things like
the logging routines though.
Andrew
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.01.9811041946050.780-100000>
