Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 1 May 1997 16:54:39 -0400 (EDT)
From:      Bradley Dunn <bradley@dunn.org>
To:        freebsd-security@freebsd.org
Subject:   Telnetd problem?
Message-ID:  <Pine.BSF.3.96.970501163938.16494E-100000@ns2.harborcom.net>

next in thread | raw e-mail | index | archive | help
>From src/libexec/telnetd/sys_term.c:
char speed[128];
...
sprintf(speed, "%s/%d", (cp = getenv("TERM")) ? cp : "",
                                (def_rspeed > 0) ? def_rspeed : 9600);

This code is identical to the problematic kerberos code that was in the
SNI advisory.

Also, it appears that the eBones in FreeBSD is vulnerable to both problems
in the SNI advisory. Just do a grep for 'strcpy' in src/eBones/lib/libkrb.

pbd

--
Why can't you be a non-conformist like everyone else?




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.970501163938.16494E-100000>