Date: Sun, 4 Feb 2001 01:40:03 -0800 (PST) From: Kris Kennaway <kris@obsecurity.org> To: freebsd-bugs@FreeBSD.org Subject: Re: bin/24810: kerberosIV and heimdal ftpd is vulnerable to buffer overflow Message-ID: <200102040940.f149e3t95195@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
The following reply was made to PR bin/24810; it has been noted by GNATS. From: Kris Kennaway <kris@obsecurity.org> To: venglin@freebsd.lublin.pl Cc: FreeBSD-gnats-submit@FreeBSD.ORG Subject: Re: bin/24810: kerberosIV and heimdal ftpd is vulnerable to buffer overflow Date: Sun, 4 Feb 2001 01:39:05 -0800 --4Ckj6UjgE2iN1+kY Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Fri, Feb 02, 2001 at 11:28:35PM +0000, venglin@freebsd.lublin.pl wrote: > KTH Kerberos5 and KerberosIV ftpd is vulnerable to strtok() based > stack overflow. Thanks, but AFAIK we don't compile this code. Kris --4Ckj6UjgE2iN1+kY Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE6fSM5Wry0BWjoQKURAhG8AJ9nuSYfUiKWcN4w9HFPwV43FtSn6ACgug2j 8yxlObhEEeae513sZ/J8BIs= =hhn3 -----END PGP SIGNATURE----- --4Ckj6UjgE2iN1+kY-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200102040940.f149e3t95195>