Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 07 Nov 2000 11:28:16 -0700
From:      Wes Peters <wes@softweyr.com>
To:        security@freebsd.org
Subject:   Re: FreeBSD Security Advisory: FreeBSD-SA-00:61.tcpdump [REISSUED]
Message-ID:  <3A0849C0.750F0EF6@softweyr.com>
References:  <20001106195827.5C6BA37B4CF@hub.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
FreeBSD Security Advisories wrote:
> 
> II.  Problem Description
> 
> Several overflowable buffers were discovered in the version of tcpdump
> included in FreeBSD, during internal source code auditing.

Does this problem manifest itself in the ethereal port as well?  I don't 
know how closely related the code between the two might be.  I've taken
a cursory look and it isn't identical, but tcpdump is mentioned several
places in the source.

-- 
            "Where am I, and what am I doing in this handbasket?"

Wes Peters                                                         Softweyr LLC
wes@softweyr.com                                           http://softweyr.com/


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3A0849C0.750F0EF6>