Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 25 Feb 2003 11:06:29 +0100
From:      Uwe Doering <gemini@geminix.org>
To:        freebsd-security@freebsd.org
Subject:   Re: Fwd: buffer overrun in zlib 1.1.4
Message-ID:  <3E5B4025.60509@geminix.org>
In-Reply-To: <20030224162747.GB87372@madman.celabo.org>
References:  <20030224160844.GE82145@nevermind.kiev.ua> <20030224162747.GB87372@madman.celabo.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Jacques A. Vidrine wrote:
> On Mon, Feb 24, 2003 at 06:08:44PM +0200, Alexandr Kovalenko wrote:
> 
>>----- Forwarded message from Richard Kettlewell <rjk@greenend.org.uk> -----
>>
>>Date: Sat, 22 Feb 2003 00:05:47 +0000
>>From: Richard Kettlewell <rjk@greenend.org.uk>
>>X-Mailer: Norman
>>To: bugtraq@securityfocus.com
>>Subject: buffer overrun in zlib 1.1.4
>>X-Mailer: VM 7.03 under 21.4 (patch 6) "Common Lisp" XEmacs Lucid
>>
>>zlib contains a function called gzprintf().  This is similar in
>>behaviour to fprintf() except that by default, this function will
>>smash the stack if called with arguments that expand to more than
>>Z_PRINTF_BUFSIZE (=4096 by default) bytes.
> 
> Nothing in the base system uses gzprintf, AFAIK.
> If applications are found that use it (and do not check Z_PRINTF_BUFSIZE),
> then please let us know.
> 
> When an official zlib patch or new version is available, we'll
> import it.

Also, there is an explicit

   -DHAS_snprintf -DHAS_vsnprintf

added to CFLAGS in the Makefile. So, as far as I understand the 
situation, the version in the base system should be immune against this 
buffer overrun, anyway.

    Uwe
-- 
Uwe Doering <gemini@geminix.org>
Berlin, Germany


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3E5B4025.60509>