Re: FreeBSD Security Advisory FreeBSD-SA-08:02.libc

看板FB_security作者時間18年前 (2008/01/15 12:44), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串2/6 (看更多)
At 06:09 PM 1/14/2008, FreeBSD Security Advisories wrote: >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > >============================================================================= >FreeBSD-SA-08:02.libc Security Advisory > The FreeBSD Project > >Topic: inet_network() buffer overflow > >For programs which passes untrusted data to inet_network(), an >attacker may be able to overwrite a region of memory with user defined >data by causing specially crafted input to be passed to >inet_network(). For the "usual suspects" of applications running, (e.g. sendmail, apache, BIND etc) would it be possible to pass crafted packets through to this function remotely via those apps ? ie how easy is this to do ? ---Mike _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #17Z3f200 (FB_security)
討論串 (同標題文章)
文章代碼(AID): #17Z3f200 (FB_security)