Date: Sun, 4 Feb 2001 10:41:40 +0100 From: Przemyslaw Frasunek <venglin@freebsd.lublin.pl> To: Kris Kennaway <kris@obsecurity.org> Cc: freebsd-bugs@FreeBSD.org Subject: Re: bin/24810: kerberosIV and heimdal ftpd is vulnerable to buffer overflow Message-ID: <20010204104140.A72593@riget.scene.pl> In-Reply-To: <20010204013905.A45346@xor.obsecurity.org>; from kris@obsecurity.org on Sun, Feb 04, 2001 at 01:39:05AM -0800 References: <20010202232835.70065.qmail@riget.scene.pl> <20010204013905.A45346@xor.obsecurity.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, Feb 04, 2001 at 01:39:05AM -0800, Kris Kennaway wrote: > > KTH Kerberos5 and KerberosIV ftpd is vulnerable to strtok() based > > stack overflow. > Thanks, but AFAIK we don't compile this code. Yes, but it should be patched. opieftpd is also vulnerable - http://www.FreeBSD.org/cgi/query-pr.cgi?pr=23352 -- * Fido: 2:480/124 ** WWW: http://www.frasunek.com/ ** NIC-HDL: PMF9-RIPE * * Inet: przemyslaw@frasunek.com ** PGP: D48684904685DF43EA93AFA13BE170BF * To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010204104140.A72593>