[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: CVE-2008-1391 - Multiple BSD Platforms "strfmon()" Function Integer Overflow
- To: stheg olloydson <stheg_olloydson_(_at_)_yahoo_(_dot_)_com>
- Subject: Re: CVE-2008-1391 - Multiple BSD Platforms "strfmon()" Function Integer Overflow
- From: "Simon L. Nielsen" <simon_(_at_)_FreeBSD_(_dot_)_org>
- Date: Sun, 6 Apr 2008 22:55:06 +0200
- Cc: freebsd-security_(_at_)_freebsd_(_dot_)_org
On 2008.04.06 12:47:11 -0700, stheg olloydson wrote:
> According to the information at mitre.org, both 6.x and 7.0 are
> vulnerable. I see in NetBSD's CVS log for
> src/lib/libc/stdlib/strfmon.c, they have patched this on March
Note that the change in NetBSD is possibly incomplete to fix the
issue. I'm not sure what the final conclusion was on that.
> Looking at FreeBSD's CVS log at
> shows that no changes have been made since Mon Sep 12, 2005.
> Is our strfmon() not vulnerable as reported?
The FreeBSD version is affected and will be fixed in -CURRENT / HEAD
shortly. The FreeBSD Security Team has yet to be able to come up with
any real cases where this is an actual security issue, so unless we
find any place where this is actually a problem, the issue will be
handled as a normal bug and merged to -STABLE branches acordingly.
Note that allowing untrusted format strings to be used is normally a
bad idea, so any application where the strfmon issue is a problem are
likely already broken.
Simon L. Nielsen
FreeBSD Security Team
freebsd-security_(_at_)_freebsd_(_dot_)_org mailing list
To unsubscribe, send any mail to "freebsd-security-unsubscribe_(_at_)_freebsd_(_dot_)_org"
Visit your host, monkey.org