Date: Tue, 07 Nov 2000 11:28:16 -0700 From: Wes Peters <wes@softweyr.com> To: security@freebsd.org Subject: Re: FreeBSD Security Advisory: FreeBSD-SA-00:61.tcpdump [REISSUED] Message-ID: <3A0849C0.750F0EF6@softweyr.com> References: <20001106195827.5C6BA37B4CF@hub.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
FreeBSD Security Advisories wrote:
>
> II. Problem Description
>
> Several overflowable buffers were discovered in the version of tcpdump
> included in FreeBSD, during internal source code auditing.
Does this problem manifest itself in the ethereal port as well? I don't
know how closely related the code between the two might be. I've taken
a cursory look and it isn't identical, but tcpdump is mentioned several
places in the source.
--
"Where am I, and what am I doing in this handbasket?"
Wes Peters Softweyr LLC
wes@softweyr.com http://softweyr.com/
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3A0849C0.750F0EF6>
