Bugtraq mailing list archives

Re: buffer overflow in nslookup?


From: deraadt () CVS OPENBSD ORG (Theo de Raadt)
Date: Mon, 31 Aug 1998 01:17:40 -0600


If your nslookup's main.c includes:

    sscanf(string, " %s", host);        /* removes white space */

(at line 681 in 4.9.7-REL and at line 684 in 8.1.2) and it does not
check the length of 'string', then you are vulnerable.

Nearly all the sscanf's parsing for some varient of %s are possible
vulnerabilities.

The same applies to "dig".

They must all be fixed.



Current thread: