Skip site navigation (1)Skip section navigation (2)
Date:      2 Nov 2000 07:08:27 -0000
From:      venglin@freebsd.lublin.pl
To:        FreeBSD-gnats-submit@freebsd.org
Subject:   bin/22496: [SECURITY] Yet another top(1) format string vulnerability
Message-ID:  <20001102070827.16162.qmail@riget.scene.pl>

next in thread | raw e-mail | index | archive | help

>Number:         22496
>Category:       bin
>Synopsis:       [SECURITY] Yet another top(1) format string vulnerability
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    freebsd-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Wed Nov 01 23:10:01 PST 2000
>Closed-Date:
>Last-Modified:
>Originator:     Przemyslaw Frasunek
>Release:        FreeBSD 4.1.1-STABLE i386
>Organization:
ISMEDIA
>Environment:

FreeBSD 4.1.1-STABLE as of 2 November 2000.

>Description:

	Vulnerability very similar to FreeBSD-SA-00:62, just few lines below
	in top.c, but still not fixed.

>How-To-Repeat:

	1. Run top
	2. Press 'r'
	3. Type '20 %n'
	4. Segfault

>Fix:

--- top.c.old	Thu Nov  2 08:07:29 2000
+++ top.c	Thu Nov  2 08:08:17 2000
@@ -826,7 +826,7 @@
 				{
 				    if ((errmsg = renice_procs(tempbuf2)) != NULL)
 				    {
-					new_message(MT_standout, errmsg);
+					new_message(MT_standout, "%s", errmsg);
 					putchar('\r');
 					no_command = Yes;
 				    }

>Release-Note:
>Audit-Trail:
>Unformatted:


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001102070827.16162.qmail>