Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 4 Feb 2001 10:41:40 +0100
From:      Przemyslaw Frasunek <venglin@freebsd.lublin.pl>
To:        Kris Kennaway <kris@obsecurity.org>
Cc:        freebsd-bugs@FreeBSD.org
Subject:   Re: bin/24810: kerberosIV and heimdal ftpd is vulnerable to buffer overflow
Message-ID:  <20010204104140.A72593@riget.scene.pl>
In-Reply-To: <20010204013905.A45346@xor.obsecurity.org>; from kris@obsecurity.org on Sun, Feb 04, 2001 at 01:39:05AM -0800
References:  <20010202232835.70065.qmail@riget.scene.pl> <20010204013905.A45346@xor.obsecurity.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, Feb 04, 2001 at 01:39:05AM -0800, Kris Kennaway wrote:
> > 	KTH Kerberos5 and KerberosIV ftpd is vulnerable to strtok() based
> > 	stack overflow.
> Thanks, but AFAIK we don't compile this code.

Yes, but it should be patched.

opieftpd is also vulnerable - http://www.FreeBSD.org/cgi/query-pr.cgi?pr=23352

-- 
* Fido: 2:480/124 ** WWW: http://www.frasunek.com/ ** NIC-HDL: PMF9-RIPE *
* Inet: przemyslaw@frasunek.com ** PGP: D48684904685DF43EA93AFA13BE170BF *


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010204104140.A72593>