Bugtraq mailing list archives
Re: Remote buffer overflow in Webalizer
From: Lars Hecking <lhecking () nmrc ie>
Date: Wed, 17 Apr 2002 11:06:58 +0100
Franck Coppola writes:
Here is a patch to fix the vulnerability (tested against webalizer-2.01-06). Franck
I assume the fact that the patch was in some mangled, binary-ish format was the reason why it slipped through to the list. It is quite obviously wrong (see man strncpy()). |--- dns_resolv.c Tue Apr 16 00:53:19 2002 |*************** |*** 445,449 **** | size,strlen(res_ent->h_name)); | |! strcpy(child_buf, res_ent->h_name); | size = strlen(child_buf); | } |--- 445,449 ---- | size,strlen(res_ent->h_name)); | |! strncpy(child_buf, res_ent->h_name, MAXHOST); | size = strlen(child_buf); | }
Current thread:
- Remote buffer overflow in Webalizer Spybreak (Apr 15)
- Re: Remote buffer overflow in Webalizer Franck Coppola (Apr 16)
- Re: Remote buffer overflow in Webalizer Bradford L. Barrett (Apr 17)
- Re: Remote buffer overflow in Webalizer Lars Hecking (Apr 18)
- Re: Remote buffer overflow in Webalizer Franck Coppola (Apr 16)