Date: Tue, 25 Feb 2003 11:06:29 +0100 From: Uwe Doering <gemini@geminix.org> To: freebsd-security@freebsd.org Subject: Re: Fwd: buffer overrun in zlib 1.1.4 Message-ID: <3E5B4025.60509@geminix.org> In-Reply-To: <20030224162747.GB87372@madman.celabo.org> References: <20030224160844.GE82145@nevermind.kiev.ua> <20030224162747.GB87372@madman.celabo.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Jacques A. Vidrine wrote:
> On Mon, Feb 24, 2003 at 06:08:44PM +0200, Alexandr Kovalenko wrote:
>
>>----- Forwarded message from Richard Kettlewell <rjk@greenend.org.uk> -----
>>
>>Date: Sat, 22 Feb 2003 00:05:47 +0000
>>From: Richard Kettlewell <rjk@greenend.org.uk>
>>X-Mailer: Norman
>>To: bugtraq@securityfocus.com
>>Subject: buffer overrun in zlib 1.1.4
>>X-Mailer: VM 7.03 under 21.4 (patch 6) "Common Lisp" XEmacs Lucid
>>
>>zlib contains a function called gzprintf(). This is similar in
>>behaviour to fprintf() except that by default, this function will
>>smash the stack if called with arguments that expand to more than
>>Z_PRINTF_BUFSIZE (=4096 by default) bytes.
>
> Nothing in the base system uses gzprintf, AFAIK.
> If applications are found that use it (and do not check Z_PRINTF_BUFSIZE),
> then please let us know.
>
> When an official zlib patch or new version is available, we'll
> import it.
Also, there is an explicit
-DHAS_snprintf -DHAS_vsnprintf
added to CFLAGS in the Makefile. So, as far as I understand the
situation, the version in the base system should be immune against this
buffer overrun, anyway.
Uwe
--
Uwe Doering <gemini@geminix.org>
Berlin, Germany
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3E5B4025.60509>
