tech-security archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Buffer Copy without Checking Size of Input (CVE-2016-6559)



			Hi tech-security,

I just noticed this post:
https://www.kb.cert.org/vuls/id/548487

Apparently NetBSD is vulnerable too:

src/lib/libc/net/linkaddr.c:
137 char *
138 link_ntoa(const struct sockaddr_dl *sdl)
139 {
140         static char obuf[64];
141         register char *out = obuf;
142         register size_t i;
143         const u_char *in = (const u_char *)CLLADDR(sdl);
144         const u_char *inlim = in + sdl->sdl_alen;
145         int firsttime = 1;
146
147         _DIAGASSERT(sdl != NULL);
148
149         if (sdl->sdl_nlen) {
150 (void)memcpy(obuf, sdl->sdl_data, (size_t)sdl->sdl_nlen);

(ouch)

Is someone working on this?

Cheers,
--
khorben



Home | Main Index | Thread Index | Old Index