Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 14 Jan 2008 23:28:46 -0500
From:      Mike Tancsa <mike@sentex.net>
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-08:02.libc
Message-ID:  <200801150428.m0F4SaH1084137@lava.sentex.ca>
In-Reply-To: <200801142309.m0EN9has056540@freefall.freebsd.org>
References:  <200801142309.m0EN9has056540@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
At 06:09 PM 1/14/2008, FreeBSD Security Advisories wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>=============================================================================
>FreeBSD-SA-08:02.libc                                       Security Advisory
>                                                           The FreeBSD Project
>
>Topic:          inet_network() buffer overflow
>
>For programs which passes untrusted data to inet_network(), an
>attacker may be able to overwrite a region of memory with user defined
>data by causing specially crafted input to be passed to
>inet_network().

For the "usual suspects" of applications running, (e.g. sendmail, 
apache, BIND etc) would it be possible to pass crafted packets 
through to this function remotely via those apps ?  ie how easy is this to do ?

         ---Mike 




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200801150428.m0F4SaH1084137>