tech-security archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Buffer Copy without Checking Size of Input (CVE-2016-6559)
Hi tech-security,
I just noticed this post:
https://www.kb.cert.org/vuls/id/548487
Apparently NetBSD is vulnerable too:
src/lib/libc/net/linkaddr.c:
137 char *
138 link_ntoa(const struct sockaddr_dl *sdl)
139 {
140 static char obuf[64];
141 register char *out = obuf;
142 register size_t i;
143 const u_char *in = (const u_char *)CLLADDR(sdl);
144 const u_char *inlim = in + sdl->sdl_alen;
145 int firsttime = 1;
146
147 _DIAGASSERT(sdl != NULL);
148
149 if (sdl->sdl_nlen) {
150 (void)memcpy(obuf, sdl->sdl_data,
(size_t)sdl->sdl_nlen);
(ouch)
Is someone working on this?
Cheers,
--
khorben
Home |
Main Index |
Thread Index |
Old Index