Date: 2 Nov 2000 07:08:27 -0000 From: venglin@freebsd.lublin.pl To: FreeBSD-gnats-submit@freebsd.org Subject: bin/22496: [SECURITY] Yet another top(1) format string vulnerability Message-ID: <20001102070827.16162.qmail@riget.scene.pl>
next in thread | raw e-mail | index | archive | help
>Number: 22496 >Category: bin >Synopsis: [SECURITY] Yet another top(1) format string vulnerability >Confidential: no >Severity: critical >Priority: high >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed Nov 01 23:10:01 PST 2000 >Closed-Date: >Last-Modified: >Originator: Przemyslaw Frasunek >Release: FreeBSD 4.1.1-STABLE i386 >Organization: ISMEDIA >Environment: FreeBSD 4.1.1-STABLE as of 2 November 2000. >Description: Vulnerability very similar to FreeBSD-SA-00:62, just few lines below in top.c, but still not fixed. >How-To-Repeat: 1. Run top 2. Press 'r' 3. Type '20 %n' 4. Segfault >Fix: --- top.c.old Thu Nov 2 08:07:29 2000 +++ top.c Thu Nov 2 08:08:17 2000 @@ -826,7 +826,7 @@ { if ((errmsg = renice_procs(tempbuf2)) != NULL) { - new_message(MT_standout, errmsg); + new_message(MT_standout, "%s", errmsg); putchar('\r'); no_command = Yes; } >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001102070827.16162.qmail>