Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 21 Nov 1998 20:40:01 -0800 (PST)
From:      David Greenman <dg@root.com>
To:        freebsd-bugs@FreeBSD.ORG
Subject:   Re: bin/8790: [PATCH] Buffer overrun in nvi-1.79. 
Message-ID:  <199811220440.UAA00498@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
The following reply was made to PR bin/8790; it has been noted by GNATS.

From: David Greenman <dg@root.com>
To: viro@math.psu.edu
Cc: FreeBSD-gnats-submit@FreeBSD.ORG
Subject: Re: bin/8790: [PATCH] Buffer overrun in nvi-1.79. 
Date: Sat, 21 Nov 1998 20:39:19 -0800

 >	Regex used in nvi is vulnerable to the following exploit:
 
    I'm wondering what you mean by "exploitable buffer overrun"...? You make
 this sound like a security problem, but nvi isn't installed suid/sgid.
 
 -DG
 
 David Greenman
 Co-founder/Principal Architect, The FreeBSD Project

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199811220440.UAA00498>