LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-13-2009, 04:27 AM   #16
H_TeXMeX_H
LQ Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Rep: Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301

Quote:
Originally Posted by alan_ri View Post
you'll see that this patch isn't preventing buffer overflow completly,only in a way.
There are more examples in the link I posted before.
Well, you might be right, and if you fix it up maybe you'll get $1000 too ?
 
Old 03-13-2009, 05:26 AM   #17
alan_ri
Senior Member
 
Registered: Dec 2007
Location: Croatia
Distribution: Debian GNU/Linux
Posts: 1,733
Blog Entries: 5

Rep: Reputation: 127Reputation: 127
Quote:
Originally Posted by H_TeXMeX_H View Post
Well, you might be right, and if you fix it up maybe you'll get $1000 too ?
Maybe I will.
 
Old 03-13-2009, 05:55 AM   #18
ErV
Senior Member
 
Registered: Mar 2007
Location: Russia
Distribution: Slackware 12.2
Posts: 1,202
Blog Entries: 3

Rep: Reputation: 62
Quote:
Originally Posted by H_TeXMeX_H View Post
Well, that's exactly what's happening here, before the fix there was likely insufficient bounds checking.

Code:
-    if (dlen <= 128)
+    if ((dlen <= 128) && (response_len < 16384))
       if (name_num < NAMES) {
        byte_copy(name[name_num],dlen,d);
        name_ptr[name_num] = response_len;
I think the red line is somewhat dangerous without bounds checking on response_len first.
Fragment mentioned in patch is extremely short and it DOESN'T deal with buffers associated response_len. Buffer used in conjuction with response_len could be happily overrun before(or after) that code fragment - even despite checking. Full source code (at least file) required to make further statements about buffer overruns in this code fragment.

Oh, and red line ISN't dangerous. You can see that value of response_len is being stored at the offset of name_num. What happens with this value later is unclear. "name_num" was checked even before patch was applied - unless I forgot patch file syntax, "red line" isn't modified by patch, and sanity check for name_num isn't added by patch either (it existed before patch). So patch doesn't affect risk of bufer overrun at "red line". Maybe it fixes possibility of buffer overrun in some other place (for buffers associated with response_len), but to check this, full code fragment required.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: SugarCRM Announces 1,000 Customers and 1,000,000 Open Source Downloads as Momentum for Open Source Applications Grows LXer Syndicated Linux News 0 12-19-2006 05:33 AM
LXer: Stallman to keynote Korean hacker/security conference LXer Syndicated Linux News 0 10-04-2006 03:33 AM
1,000,000,000 PCs by 2010 masand Linux - News 4 11-01-2004 01:55 AM
linux security/hacker websites t3___ Linux - Security 2 07-12-2004 05:04 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:06 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration