mailing list archives
Re: TOG and xterm problem
From: peak () kerberos troja mff cuni cz (Pavel Kankovsky)
Date: Mon, 4 May 1998 11:06:05 +0200
On Fri, 1 May 1998, Jeff Gehlbach wrote:
Open Group, when *will* the rest of us see at least some clues about where
the bug lies and how it can be fixed? You say you won't release patches
to X11R<6.4, but can you at least be nice enough to tell those of us using
the still-perfectly-serviceable 6.3 just a tidbit about the problem?
Believe or not, it took me 10 minutes to grep the appropriate parts of
X11R6.3 sources, following the clues mentioned in the CERT advisory, and
find the bugs--at least some of them.
(void) sprintf( mapName, "%sKeymap", params );
(void) strcpy( mapClass, mapName );
(actually, the second command is mostly harmless because the size of
mapName and mapClass is the same)
char *s, *save_s, *ss, *list, **lp, *end;
list[i] = s;
(This one is quite interesting.
Exercise for the reader: write an exploit.)
Security hint of the day:
find . -name '*.[ch]' | \
xargs egrep -l 'sprintf|strcat|strcpy' | \
--Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ]
P.S. A copy of this message is being submitted to XFree86.