Date: Thu, 1 May 1997 16:54:39 -0400 (EDT) From: Bradley Dunn <bradley@dunn.org> To: freebsd-security@freebsd.org Subject: Telnetd problem? Message-ID: <Pine.BSF.3.96.970501163938.16494E-100000@ns2.harborcom.net>
index | next in thread | raw e-mail
>From src/libexec/telnetd/sys_term.c:
char speed[128];
...
sprintf(speed, "%s/%d", (cp = getenv("TERM")) ? cp : "",
(def_rspeed > 0) ? def_rspeed : 9600);
This code is identical to the problematic kerberos code that was in the
SNI advisory.
Also, it appears that the eBones in FreeBSD is vulnerable to both problems
in the SNI advisory. Just do a grep for 'strcpy' in src/eBones/lib/libkrb.
pbd
--
Why can't you be a non-conformist like everyone else?
home |
help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.970501163938.16494E-100000>
