Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 4 Feb 2001 01:40:03 -0800 (PST)
From:      Kris Kennaway <kris@obsecurity.org>
To:        freebsd-bugs@FreeBSD.org
Subject:   Re: bin/24810: kerberosIV and heimdal ftpd is vulnerable to buffer overflow
Message-ID:  <200102040940.f149e3t95195@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
The following reply was made to PR bin/24810; it has been noted by GNATS.

From: Kris Kennaway <kris@obsecurity.org>
To: venglin@freebsd.lublin.pl
Cc: FreeBSD-gnats-submit@FreeBSD.ORG
Subject: Re: bin/24810: kerberosIV and heimdal ftpd is vulnerable to buffer overflow
Date: Sun, 4 Feb 2001 01:39:05 -0800

 --4Ckj6UjgE2iN1+kY
 Content-Type: text/plain; charset=us-ascii
 Content-Disposition: inline
 
 On Fri, Feb 02, 2001 at 11:28:35PM +0000, venglin@freebsd.lublin.pl wrote:
 
 > 	KTH Kerberos5 and KerberosIV ftpd is vulnerable to strtok() based
 > 	stack overflow.
 
 Thanks, but AFAIK we don't compile this code.
 
 Kris
 
 --4Ckj6UjgE2iN1+kY
 Content-Type: application/pgp-signature
 Content-Disposition: inline
 
 -----BEGIN PGP SIGNATURE-----
 Version: GnuPG v1.0.4 (FreeBSD)
 Comment: For info see http://www.gnupg.org
 
 iD8DBQE6fSM5Wry0BWjoQKURAhG8AJ9nuSYfUiKWcN4w9HFPwV43FtSn6ACgug2j
 8yxlObhEEeae513sZ/J8BIs=
 =hhn3
 -----END PGP SIGNATURE-----
 
 --4Ckj6UjgE2iN1+kY--
 


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200102040940.f149e3t95195>