Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 28 Sep 2000 10:35:42 -0400
From:      Dan Moschuk <dan@FreeBSD.org>
To:        Kris Kennaway <kris@FreeBSD.org>
Cc:        audit@FreeBSD.org
Subject:   Re: tcpdump security vulnerabilities
Message-ID:  <20000928103542.A38089@spirit.jaded.net>
In-Reply-To: <Pine.BSF.4.21.0009272116480.31282-100000@freefall.freebsd.org>; from kris@FreeBSD.org on Wed, Sep 27, 2000 at 09:24:10PM -0700
References:  <Pine.BSF.4.21.0009272116480.31282-100000@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help

| Hi,
| 
| I happened to be taking a look through the tcpdump 3.5 source tonight and

[ snip ]

| Please review this patch - if this is acceptable to the tcpdump guys, I'll
| commit it to FreeBSD and release an advisory shortly thereafter.

The patch seems fairly harmless, but remember that tcpdump is contrib
code and the patch should go the maintainers first.  To increase the chance
of them accepting it, you may want to roll your own snprintf() routine for
the few remaining OSs that don't have it, or hint that they should do it
if they want their code to compile on older versions of Solaris. :) 

Cheers!
-Dan
-- 
Man is a rational animal who always loses his temper when he is called
upon to act in accordance with the dictates of reason.
                -- Oscar Wilde


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-audit" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000928103542.A38089>