lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1078562690.2637.15.camel@limit.tm.in>
From: balwinder at gmx.net (Balwinder Singh)
Subject: EFC Released

> Although I appriciate ideas to enhance security concerning buffer 
> overflows or format string bugs, i cannot understand why to find
> the following lines in etc_db_new.c including your package:
> 
> <snip>
> char pwd[MAX_PATH_LEN];
> ...
> i = 0;
> while((ch = fgetc(strace_file)) != '\0') {
>    pwd[i] = ch;
>    i++;
> }
> ...
> </snip>
> Haven't found any made borders. And yes, due to its permissions it won't 
> let people become root ... it is just a cosmetic failure. (hopefully) :)
> Moreover, and that is the actual reason for replying your mail ...
> I couldn't find the patch in $EFC_PATH/efc/ ... did I just download a 
> non complete package?
> 
Thanks for pointing out the problems. Both problems have been corrected
in 1.0.2 version.
Please get the newer version of EFC from sourceforge.

Regards

Bal


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ