Vulnerability Development mailing list archives
Re: Neotrace v2.12a Buffer Overflow [?]
From: Juliano Rizzo <juliano () CORE-SDI COM>
Date: Mon, 4 Sep 2000 15:35:49 +0300
On 2/9 Juliano Rizzo wrote: [...]
Would be a problem if the same overflow occurs when the program resolves domain names or request any other information from a remote non trusted source.
Well, I didn't say in my last post that there is a possible exploitable remote overflow in Neotrace v2.12a. It will crash resolving long domain names, the target host's name or any hop in the middle. You can check it editing the hosts file: 10.0.66.6 AAAAAAAAAAAAAAAAAAAAAAAAAAAAAA(a lot) Then try to use Neotrace against that ip, the AA's string will be lowercased before overflow. May be there are other exploitable bugs in this program, all the code should be checked if it try to be a secure application. -- Juliano Rizzo <juliano () core-sdi com> [www.core-sdi.com] julianor.tripod.com
Current thread:
- Neotrace v2.12a Buffer Overflow [?] Erik Tayler (Sep 01)
- Re: Neotrace v2.12a Buffer Overflow [?] eEye Digital Security (Sep 01)
- Re: Neotrace v2.12a Buffer Overflow [?] Erik Tayler (Sep 01)
- Re: Neotrace v2.12a Buffer Overflow [?] Juliano Rizzo (Sep 02)
- <Possible follow-ups>
- Re: Neotrace v2.12a Buffer Overflow [?] Juliano Rizzo (Sep 04)
- Re: Neotrace v2.12a Buffer Overflow [?] eEye Digital Security (Sep 01)