Subject: Re: *BSD banner INT overflow vulnerability (fwd)
To: None <tech-security@netbsd.org>
From: gabriel rosenkoetter <gr@eclipsed.net>
List: tech-security
Date: 11/27/2006 10:26:28
--/DkgDsqJFFamjKX0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Wed, Nov 22, 2006 at 10:15:04AM -0600, Jeremy C. Reed wrote:
> Forwarded mail from bugtraq below.
>=20
> In our case it is our second banner (/usr/games/banner).
>=20
> I just committed fix to improve its check for valid -w width.
>=20
> By the way, I don't know of anyone making this setuid nor using this via=
=20
> some public gateway.
I was going to say: "Somehow, I'm not exactly ph34ring over a binary
we install with mode 0444..."
Even if used via a public gateway, surely the biggest conern is a
DoS?
--=20
gabriel rosenkoetter
gr@eclipsed.net
--/DkgDsqJFFamjKX0
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (NetBSD)
iD8DBQFFawOk9ehacAz5CRoRAoirAJ41+5Jcl+/c1DQH6Ynw81az4zkwbgCfRYhc
JNr6qA+4gln2pCYeBq5Ynfw=
=dhFZ
-----END PGP SIGNATURE-----
--/DkgDsqJFFamjKX0--