Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 14 Oct 2000 09:46:04 +0300
From:      Valentin Nechayev <netch@lucky.net>
To:        freebsd-security@FreeBSD.ORG
Subject:   Re: ncurses buffer overflows (fwd)
Message-ID:  <20001014094604.A18459@lucky.net>
In-Reply-To: <200010101403.e9AE3Ir08713@cwsys.cwsent.com>; from Cy.Schubert@uumail.gov.bc.ca on Tue, Oct 10, 2000 at 07:02:30AM -0700
References:  <200010101403.e9AE3Ir08713@cwsys.cwsent.com>

next in thread | previous in thread | raw e-mail | index | archive | help
 Tue, Oct 10, 2000 at 07:02:30, Cy.Schubert wrote about "ncurses buffer overflows (fwd)": 

> For those of you who don't subscribe to BUGTRAQ, here's a heads up.

Are systat & top in 3.* vulnerable? Shall it be fixed?
systat in 3.* uses curses, but at my box exploit failed.

netch@unicorn:~>csh tmp/systat.sh
Word too long.
netch@unicorn:~>ls -l /tmp/csh
ls: /tmp/csh: No such file or directory
netch@unicorn:~>uname -mrs
FreeBSD 3.5-STABLE i386
netch@unicorn:~>fgrep FreeBSD /usr/include/sys/param.h
 * $FreeBSD: src/sys/sys/param.h,v 1.38.2.14 2000/07/12 20:37:04 asami Exp $
#undef __FreeBSD_version
#define __FreeBSD_version 350001        /* Master, propagated to newvers */


/netch


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001014094604.A18459>