Date: Mon, 14 Jan 2008 23:28:46 -0500 From: Mike Tancsa <mike@sentex.net> To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-08:02.libc Message-ID: <200801150428.m0F4SaH1084137@lava.sentex.ca> In-Reply-To: <200801142309.m0EN9has056540@freefall.freebsd.org> References: <200801142309.m0EN9has056540@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
At 06:09 PM 1/14/2008, FreeBSD Security Advisories wrote: >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > >============================================================================= >FreeBSD-SA-08:02.libc Security Advisory > The FreeBSD Project > >Topic: inet_network() buffer overflow > >For programs which passes untrusted data to inet_network(), an >attacker may be able to overwrite a region of memory with user defined >data by causing specially crafted input to be passed to >inet_network(). For the "usual suspects" of applications running, (e.g. sendmail, apache, BIND etc) would it be possible to pass crafted packets through to this function remotely via those apps ? ie how easy is this to do ? ---Mike
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200801150428.m0F4SaH1084137>