From owner-freebsd-security@FreeBSD.ORG Tue Jan 15 05:57:45 2008 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 8292C16A419 for ; Tue, 15 Jan 2008 05:57:45 +0000 (UTC) (envelope-from mike@sentex.net) Received: from smarthost2.sentex.ca (smarthost2.sentex.ca [205.211.164.50]) by mx1.freebsd.org (Postfix) with ESMTP id 5EEF713C45B for ; Tue, 15 Jan 2008 05:57:45 +0000 (UTC) (envelope-from mike@sentex.net) Received: from lava.sentex.ca (pyroxene.sentex.ca [199.212.134.18]) by smarthost2.sentex.ca (8.14.1/8.13.8) with ESMTP id m0F5viav043882; Tue, 15 Jan 2008 00:57:44 -0500 (EST) (envelope-from mike@sentex.net) Received: from mdt-xp.sentex.net (simeon.sentex.ca [192.168.43.27]) by lava.sentex.ca (8.13.8/8.13.3) with ESMTP id m0F5vhmf084591 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 15 Jan 2008 00:57:43 -0500 (EST) (envelope-from mike@sentex.net) Message-Id: <200801150557.m0F5vhmf084591@lava.sentex.ca> X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Tue, 15 Jan 2008 00:53:25 -0500 To: Mark Andrews From: Mike Tancsa In-Reply-To: <200801150522.m0F5MqV1061436@drugs.dv.isc.org> References: <200801150522.m0F5MqV1061436@drugs.dv.isc.org> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Cc: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-08:02.libc X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 15 Jan 2008 05:57:45 -0000 At 12:22 AM 1/15/2008, Mark Andrews wrote: > > > > For the "usual suspects" of applications running, (e.g. sendmail, > > apache, BIND etc) would it be possible to pass crafted packets > > through to this function remotely via those apps ? ie how easy > is this to do > > ? > > The usual suspects don't call inet_network(). > route calls inet_network() but not routed doesn't. Thanks to all who responded so far! I had a look at some of the ports I am using and so far all I found was find . -name "*.c" | xargs grep inet_network ./apache13-modssl/work/apache_1.3.33/src/modules/proxy/proxy_util.c: if (host[i] == '\0' && (ap_inet_addr(host) == -1 || inet_network(host) == -1)) ---Mike