Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: EFC Released
From: Balwinder Singh <balwinder () gmx net>
Date: Sat, 06 Mar 2004 14:14:50 +0530

Although I appriciate ideas to enhance security concerning buffer 
overflows or format string bugs, i cannot understand why to find
the following lines in etc_db_new.c including your package:

char pwd[MAX_PATH_LEN];
i = 0;
while((ch = fgetc(strace_file)) != '\0') {
   pwd[i] = ch;
Haven't found any made borders. And yes, due to its permissions it won't 
let people become root ... it is just a cosmetic failure. (hopefully) :)
Moreover, and that is the actual reason for replying your mail ...
I couldn't find the patch in $EFC_PATH/efc/ ... did I just download a 
non complete package?

Thanks for pointing out the problems. Both problems have been corrected
in 1.0.2 version.
Please get the newer version of EFC from sourceforge.



Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]