Date: Wed, 30 Jun 1999 11:26:17 -0700 (PDT) From: John Polstra <jdp@polstra.com> To: mph@astro.caltech.edu Cc: hackers@freebsd.org Subject: Re: tcpdump(1) additions. Message-ID: <199906301826.LAA07099@vashon.polstra.com> In-Reply-To: <19990630092358.A51584@wopr.caltech.edu> References: <19990630011532.A97926@dragon.nuxi.com> <Pine.HPP.3.96.990630055143.23532N-100000@hp9000.chc-chimes.com>
next in thread | previous in thread | raw e-mail | index | archive | help
In article <19990630092358.A51584@wopr.caltech.edu>, Matthew Hunt <mph@astro.caltech.edu> wrote: > > I think the point is that when root is running tcpdump on host A, a bad > guy on host B can create a packet which makes tcpdump on A execute his > code (as root, since that's who's running it). This is not desirable. I would say it is not _acceptable_. The code shouldn't go into our source tree until the known buffer overflow problems have been fixed. It's just stupid to add buffer overflow problems to a program that is always run as root. John -- John Polstra jdp@polstra.com John D. Polstra & Co., Inc. Seattle, Washington USA "Self-interest is the aphrodisiac of belief." -- James V. DeLong To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199906301826.LAA07099>