Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 16 Sep 2003 14:19:34 +0200
From:      GomoR <bsd_sa@gomor.org>
To:        security@freebsd.org
Subject:   Re: Fwd: Re: [Full-Disclosure] new ssh exploit?
Message-ID:  <20030916141934.A93383@dani.enslaved.lan>
In-Reply-To: <6.0.0.22.0.20030915205323.076ad580@209.112.4.2>; from mike@sentex.net on Mon, Sep 15, 2003 at 08:53:56PM -0400
References:  <6.0.0.22.0.20030915205323.076ad580@209.112.4.2>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, Sep 15, 2003 at 08:53:56PM -0400, Mike Tancsa wrote:
> 
> Has anyone around here heard of this ?
> 
>          ---Mike
[..]


  I think it has just been commited, but not yet disclosed. See the 
  diff in FreeBSD CVS:

$ cd /usr/src/crypto/openssh
$ cvs diff -r1.1.1.1.2.4 -r1.1.1.7
Index: buffer.c
===================================================================
RCS file: /home/ncvs/src/crypto/openssh/buffer.c,v
retrieving revision 1.1.1.1.2.4
retrieving revision 1.1.1.7
diff -r1.1.1.1.2.4 -r1.1.1.7
15c15
< RCSID("$OpenBSD: buffer.c,v 1.16 2002/06/26 08:54:18 markus Exp $");
---
> RCSID("$OpenBSD: buffer.c,v 1.17 2003/09/16 03:03:47 deraadt Exp $");
71a72
>       u_int newlen;
101,102c102,104
<       buffer->alloc += len + 32768;
<       if (buffer->alloc > 0xa00000)
---
>
>       newlen = buffer->alloc + len + 32768;
>       if (newlen > 0xa00000)
104,105c106,108
<                   buffer->alloc);
<       buffer->buf = xrealloc(buffer->buf, buffer->alloc);
---
>                   newlen);
>       buffer->buf = xrealloc(buffer->buf, newlen);
>       buffer->alloc = newlen;
-- 
______________________________________________________________________
       __  __
      /  ||   \     FreeBSD Network - http://www.GomoR.org/
     | __ |___/     Security Engineer
     |   ||  \
      \__||   \     >I route, therefore I am<



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030916141934.A93383>