Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 30 Jun 1999 11:26:17 -0700 (PDT)
From:      John Polstra <jdp@polstra.com>
To:        mph@astro.caltech.edu
Cc:        hackers@freebsd.org
Subject:   Re: tcpdump(1) additions.
Message-ID:  <199906301826.LAA07099@vashon.polstra.com>
In-Reply-To: <19990630092358.A51584@wopr.caltech.edu>
References:  <19990630011532.A97926@dragon.nuxi.com> <Pine.HPP.3.96.990630055143.23532N-100000@hp9000.chc-chimes.com>

next in thread | previous in thread | raw e-mail | index | archive | help
In article <19990630092358.A51584@wopr.caltech.edu>,
Matthew Hunt  <mph@astro.caltech.edu> wrote:
> 
> I think the point is that when root is running tcpdump on host A, a bad
> guy on host B can create a packet which makes tcpdump on A execute his
> code (as root, since that's who's running it).  This is not desirable.

I would say it is not _acceptable_.  The code shouldn't go into our
source tree until the known buffer overflow problems have been fixed.
It's just stupid to add buffer overflow problems to a program that is
always run as root.

John
-- 
  John Polstra                                               jdp@polstra.com
  John D. Polstra & Co., Inc.                        Seattle, Washington USA
  "Self-interest is the aphrodisiac of belief."           -- James V. DeLong


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199906301826.LAA07099>