Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 14 Jan 2008 21:07:45 -0800
From:      Gregory Shapiro <gshapiro@freebsd.org>
To:        Mike Tancsa <mike@sentex.net>
Cc:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-08:02.libc
Message-ID:  <20080115050745.GB17475@monkeyboy.local>
In-Reply-To: <200801150428.m0F4SaH1084137@lava.sentex.ca>
References:  <200801142309.m0EN9has056540@freefall.freebsd.org> <200801150428.m0F4SaH1084137@lava.sentex.ca>

next in thread | previous in thread | raw e-mail | index | archive | help
>> Topic:          inet_network() buffer overflow
>
> For the "usual suspects" of applications running, (e.g. sendmail, apache, 
> BIND etc) would it be possible to pass crafted packets through to this 
> function remotely via those apps ?  ie how easy is this to do ?

Speaking solely for sendmail, this issue does not appear to impact
sendmail or any utilities/libraries in the sendmail distribution.
Nothing in the sendmail distribution calls inet_network() or getnet*()
(which appears to use inet_network() in libc).




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080115050745.GB17475>