Subject: Re: Heimdal telnetd advisory
To: None <tech-security@NetBSD.org>
From: =?iso-8859-1?q?Love_H=F6rnquist_=C5strand?= <lha@netbsd.org>
List: tech-security
Date: 06/27/2005 17:21:30
--=-=-=


christos@astron.com (Christos Zoulas) writes:

> Yes, but it is not an unlimited buffer overflow like the original heimdal
> code. You can only overwrite the next 215 bytes of memory that are next
> to the terminaltype static, so I don't think it is exploitable. Anyway
> Love committed the fix from 0.7 today and he should issue pullup requests.

The original pull up requests got lost somehow, I resubmitted it for
netbsd-3 branch, I currently can't test netbsd-2 branch (travelling), In a
day or two I should be able to deal with it.

Love


--=-=-=
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (NetBSD)

iQEVAwUAQsAZgNo1gLFKFEjAAQJksQf+MRktZOQ70RNu2rmWE9ziahut3sE43PUd
P4zcDmMBP0ayqjIbhnAti3ssT/Gf1yw39uKvMmxhrUL3MNrMhaHAYtyC3hx6YIWG
A4xJ3ln5JdMy9Q/p9GZQ08niU7JdAb79oHlSUVAu49WdrOggNzRrVt6x/Xb4w8g5
t+oDMqMZWECw+3rSbOAfNmiZR8eiCqzF/hRYiT5Gdr0+rP11EZwmqbcQdEKsXX+L
z5c3S5syz3Om4fPG/k/M0vulArXKLuchysP/u7p+PXvJX8ZoJKzctyUSr2IX21IG
KiVYsf0weO1vcRLIFik2yrus3BVs2vKM/N60XZRkJtG/RTTTGFv7Dg==
=nVZJ
-----END PGP SIGNATURE-----
--=-=-=--