Date: Tue, 7 Nov 2000 22:39:05 -0800 From: Kris Kennaway <kris@FreeBSD.ORG> To: Wes Peters <wes@softweyr.com> Cc: security@FreeBSD.ORG Subject: Re: FreeBSD Security Advisory: FreeBSD-SA-00:61.tcpdump [REISSUED] Message-ID: <20001107223905.A41350@citusc17.usc.edu> In-Reply-To: <3A0849C0.750F0EF6@softweyr.com>; from wes@softweyr.com on Tue, Nov 07, 2000 at 11:28:16AM -0700 References: <20001106195827.5C6BA37B4CF@hub.freebsd.org> <3A0849C0.750F0EF6@softweyr.com>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] On Tue, Nov 07, 2000 at 11:28:16AM -0700, Wes Peters wrote: > FreeBSD Security Advisories wrote: > > > > II. Problem Description > > > > Several overflowable buffers were discovered in the version of tcpdump > > included in FreeBSD, during internal source code auditing. > > Does this problem manifest itself in the ethereal port as well? I don't > know how closely related the code between the two might be. I've taken > a cursory look and it isn't identical, but tcpdump is mentioned several > places in the source. Could be - I haven't checked. Someone should do that. Kris [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (FreeBSD) Comment: For info see http://www.gnupg.org iEYEARECAAYFAjoI9QkACgkQWry0BWjoQKUwkgCffnrLeImUDTumYHrgBMfQLczF XUsAoL4JnWN7gpI+9cH1rFRQjStdoTRx =4V/I -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001107223905.A41350>
