From owner-freebsd-current Fri Feb 7 12:50:56 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id MAA18932 for current-outgoing; Fri, 7 Feb 1997 12:50:56 -0800 (PST) Received: from rover.village.org (rover.village.org [204.144.255.49]) by freefall.freebsd.org (8.8.5/8.8.5) with SMTP id MAA18926 for ; Fri, 7 Feb 1997 12:50:50 -0800 (PST) Received: from rover.village.org [127.0.0.1] by rover.village.org with esmtp (Exim 0.56 #1) id E0vsxFt-0000om-00; Fri, 7 Feb 1997 13:50:45 -0700 To: freebsd-current@freebsd.org Subject: Re: CERT Advisory CA-97.06 - Vulnerability in rlogin/term (fwd) In-reply-to: Your message of "Thu, 06 Feb 1997 22:24:57 GMT." References: Date: Fri, 07 Feb 1997 13:50:44 -0700 From: Warner Losh Message-Id: Sender: owner-current@freebsd.org X-Loop: FreeBSD.org Precedence: bulk : ---------- Forwarded message ---------- : Date: Thu, 6 Feb 1997 15:42:57 -0600 : From: Aleph One : Reply-To: cert-advisory-request@cert.org : To: BUGTRAQ@netspace.org : Subject: CERT Advisory CA-97.06 - Vulnerability in rlogin/term : ... : FreeBSD, Inc. : ============= : This vulnerability is present in FreeBSD 2.1.5 and previous : versions. It was fixed in all FreeBSD source and : binary distributions dated after 1996/07/25. ... : ! term[MAX_TERM_LENGTH] = '\0'; ... Shouldn't that be MAX_TERM_LENGTH-1? Warner