Date: Mon, 14 Jan 2008 21:07:45 -0800 From: Gregory Shapiro <gshapiro@freebsd.org> To: Mike Tancsa <mike@sentex.net> Cc: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-08:02.libc Message-ID: <20080115050745.GB17475@monkeyboy.local> In-Reply-To: <200801150428.m0F4SaH1084137@lava.sentex.ca> References: <200801142309.m0EN9has056540@freefall.freebsd.org> <200801150428.m0F4SaH1084137@lava.sentex.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
>> Topic: inet_network() buffer overflow > > For the "usual suspects" of applications running, (e.g. sendmail, apache, > BIND etc) would it be possible to pass crafted packets through to this > function remotely via those apps ? ie how easy is this to do ? Speaking solely for sendmail, this issue does not appear to impact sendmail or any utilities/libraries in the sendmail distribution. Nothing in the sendmail distribution calls inet_network() or getnet*() (which appears to use inet_network() in libc).
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080115050745.GB17475>