[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200309160147.h8G1ld2Y019150@caligula.anu.edu.au>
From: avalon at caligula.anu.edu.au (Darren Reed)
Subject: openssh remote exploit
In some mail from auto64746@...hmail.com, sie said:
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> you can see the 2 bugs in this code?, seems to of me that theo could
> not. i am of understanding that there are exploits working on this in
> the wild. 3 remote holes in default install now !
Well, I can see at least one bug but it's not security related:
If "Buffer->alloc == X" (but offset == end == 0) and "len == X" then
it allocates an extra "X + 32k" bytes rather than filling the existing
buffer exactly. That, however wasteful, may be part of the design as
it is hard to judge it alone like that.
Maybe if you can see others you'll highlight them ?
Darren
Powered by blists - more mailing lists