Date: Sat, 21 Nov 1998 20:40:01 -0800 (PST) From: David Greenman <dg@root.com> To: freebsd-bugs@FreeBSD.ORG Subject: Re: bin/8790: [PATCH] Buffer overrun in nvi-1.79. Message-ID: <199811220440.UAA00498@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
The following reply was made to PR bin/8790; it has been noted by GNATS. From: David Greenman <dg@root.com> To: viro@math.psu.edu Cc: FreeBSD-gnats-submit@FreeBSD.ORG Subject: Re: bin/8790: [PATCH] Buffer overrun in nvi-1.79. Date: Sat, 21 Nov 1998 20:39:19 -0800 > Regex used in nvi is vulnerable to the following exploit: I'm wondering what you mean by "exploitable buffer overrun"...? You make this sound like a security problem, but nvi isn't installed suid/sgid. -DG David Greenman Co-founder/Principal Architect, The FreeBSD Project To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199811220440.UAA00498>