Re: Remote buffer overflow in Webalizer

From: Lars Hecking (lheckingat_private)
Date: Wed Apr 17 2002 - 03:06:58 PDT

  • Next message: TAKAGI, Hiromitsu: "MHonArc v2.5.2 Script Filtering Bypass Vulnerability"

    Franck Coppola writes:
    > Here is a patch to fix the vulnerability (tested against 
    > webalizer-2.01-06). 
    >     Franck 
     
     I assume the fact that the patch was in some mangled, binary-ish format
     was the reason why it slipped through to the list. It is quite obviously
     wrong (see man strncpy()).
    
    |--- dns_resolv.c        Tue Apr 16 00:53:19 2002
    |***************
    |*** 445,449 ****
    |                                     size,strlen(res_ent->h_name));
    |  
    |!                         strcpy(child_buf, res_ent->h_name);
    |                          size = strlen(child_buf);
    |                       }
    |--- 445,449 ----
    |                                     size,strlen(res_ent->h_name));
    |  
    |!                         strncpy(child_buf, res_ent->h_name, MAXHOST);
    |                          size = strlen(child_buf);
    |                       }
    



    This archive was generated by hypermail 2b30 : Thu Apr 18 2002 - 20:26:40 PDT