pkgsrc-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

pkg/40374: pkgsrc/net/nbtscan buffer overflow, wrong homepage



>Number:         40374
>Category:       pkg
>Synopsis:       pkgsrc/net/nbtscan buffer overflow, wrong homepage
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    pkg-manager
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Mon Jan 12 14:05:00 +0000 2009
>Originator:     Rob Quinn
>Release:        Solaris2.10, pkgsrc-current
>Organization:
>Environment:
>Description:
New homepage for this software is http://www.inetcat.net/software/nbtscan.html. 
 The old homepage leads to a cybersquatter.


net/nbtscan gets the buffer size wrong when null terminating a string in 
v_print_hostinfo.

int v_print_hostinfo(struct in_addr addr, const struct nb_host_info* hostinfo, 
char* sf, int hr) {
[...]
  char name[16];
[...]
      strncpy(name, hostinfo->names[i].ascii_name, 15);
      name[16]=0;
[...]
      if(sf) {
        printf("%s%s%s%s", inet_ntoa(addr), sf, name, sf);
[...]
      } else {
        printf("%-17s",  name);

>How-To-Repeat:

>Fix:
Removed the 15's and replaced with sizeof.



Home | Main Index | Thread Index | Old Index