Re: [FreeBSD-Announce] FreeBSD Security Advisory

看板FB_security作者時間12年前 (2014/01/17 05:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串34/37 (看更多)
Hi, On Tue, Jan 14, 2014 at 08:11:08PM +0000, FreeBSD Security Advisories wrote: > > II. Problem Description > > The bsnmpd(8) daemon is prone to a stack-based buffer-overflow when it > has received a specifically crafted GETBULK PDU request. > > III. Impact > > This issue could be exploited to execute arbitrary code in the context of > the service daemon, or crash the service daemon, causing a denial-of-service. > > IV. Workaround > > No workaround is available, but systems not running bsnmpd(8) are not > vulnerable. We are supposed to have SSP in all binaries that should prevent exploitations from this kind of bugs. I am curious why it hasn't been mentioned: is it because it didn't work as expected (which would require some investigation), or is it just an omission? Regards, -- Jeremie Le Hen Scientists say the world is made up of Protons, Neutrons and Electrons. They forgot to mention Morons. _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1Is4_Izs (FB_security)
討論串 (同標題文章)
文章代碼(AID): #1Is4_Izs (FB_security)