Date: Tue, 16 Sep 2003 14:19:34 +0200 From: GomoR <bsd_sa@gomor.org> To: security@freebsd.org Subject: Re: Fwd: Re: [Full-Disclosure] new ssh exploit? Message-ID: <20030916141934.A93383@dani.enslaved.lan> In-Reply-To: <6.0.0.22.0.20030915205323.076ad580@209.112.4.2>; from mike@sentex.net on Mon, Sep 15, 2003 at 08:53:56PM -0400 References: <6.0.0.22.0.20030915205323.076ad580@209.112.4.2>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, Sep 15, 2003 at 08:53:56PM -0400, Mike Tancsa wrote: > > Has anyone around here heard of this ? > > ---Mike [..] I think it has just been commited, but not yet disclosed. See the diff in FreeBSD CVS: $ cd /usr/src/crypto/openssh $ cvs diff -r1.1.1.1.2.4 -r1.1.1.7 Index: buffer.c =================================================================== RCS file: /home/ncvs/src/crypto/openssh/buffer.c,v retrieving revision 1.1.1.1.2.4 retrieving revision 1.1.1.7 diff -r1.1.1.1.2.4 -r1.1.1.7 15c15 < RCSID("$OpenBSD: buffer.c,v 1.16 2002/06/26 08:54:18 markus Exp $"); --- > RCSID("$OpenBSD: buffer.c,v 1.17 2003/09/16 03:03:47 deraadt Exp $"); 71a72 > u_int newlen; 101,102c102,104 < buffer->alloc += len + 32768; < if (buffer->alloc > 0xa00000) --- > > newlen = buffer->alloc + len + 32768; > if (newlen > 0xa00000) 104,105c106,108 < buffer->alloc); < buffer->buf = xrealloc(buffer->buf, buffer->alloc); --- > newlen); > buffer->buf = xrealloc(buffer->buf, newlen); > buffer->alloc = newlen; -- ______________________________________________________________________ __ __ / || \ FreeBSD Network - http://www.GomoR.org/ | __ |___/ Security Engineer | || \ \__|| \ >I route, therefore I am<
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030916141934.A93383>