Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 7 Nov 2000 22:39:05 -0800
From:      Kris Kennaway <kris@FreeBSD.ORG>
To:        Wes Peters <wes@softweyr.com>
Cc:        security@FreeBSD.ORG
Subject:   Re: FreeBSD Security Advisory: FreeBSD-SA-00:61.tcpdump [REISSUED]
Message-ID:  <20001107223905.A41350@citusc17.usc.edu>
In-Reply-To: <3A0849C0.750F0EF6@softweyr.com>; from wes@softweyr.com on Tue, Nov 07, 2000 at 11:28:16AM -0700
References:  <20001106195827.5C6BA37B4CF@hub.freebsd.org> <3A0849C0.750F0EF6@softweyr.com>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On Tue, Nov 07, 2000 at 11:28:16AM -0700, Wes Peters wrote:
> FreeBSD Security Advisories wrote:
> > 
> > II.  Problem Description
> > 
> > Several overflowable buffers were discovered in the version of tcpdump
> > included in FreeBSD, during internal source code auditing.
> 
> Does this problem manifest itself in the ethereal port as well?  I don't 
> know how closely related the code between the two might be.  I've taken
> a cursory look and it isn't identical, but tcpdump is mentioned several
> places in the source.

Could be - I haven't checked. Someone should do that.

Kris

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (FreeBSD)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjoI9QkACgkQWry0BWjoQKUwkgCffnrLeImUDTumYHrgBMfQLczF
XUsAoL4JnWN7gpI+9cH1rFRQjStdoTRx
=4V/I
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001107223905.A41350>