public inbox for gentoo-dev@lists.gentoo.org
 help / color / mirror / Atom feed
Search results ordered by [date|relevance]  view[summary|nested|Atom feed]
thread overview below | download: 
* [gentoo-dev] openssh exploit
@ 2003-09-16 13:22 99% Mishael A Sibiryakov
  0 siblings, 0 replies; 1+ results
From: Mishael A Sibiryakov @ 2003-09-16 13:22 UTC (permalink / raw
  To: Gentoo Dev


	Look at this:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

you can see the 2 bugs in this code?, seems to of me that theo could
not. i am of understanding that there are exploits working on this in
the wild. 3 remote holes in default install now !
hahaha

void *
buffer_append_space(Buffer *buffer, u_int len)
{
void *p;

if (len > 0x100000)
fatal("buffer_append_space: len %u not supported", len);

/* If the buffer is empty, start using it from the beginning.
*/
if (buffer->offset == buffer->end) {
buffer->offset = 0;
buffer->end = 0;
}
restart:
/* If there is enough space to store all data, store it now.
*/
if (buffer->end + len < buffer->alloc) {
p = buffer->buf + buffer->end;
buffer->end += len;
return p;
}
/*
* If the buffer is quite empty, but all data is at the end,
move the
* data to the beginning and retry.
*/
if (buffer->offset > buffer->alloc / 2) {
memmove(buffer->buf, buffer->buf + buffer->offset,
buffer->end - buffer->offset);
buffer->end -= buffer->offset;
buffer->offset = 0;
goto restart;
}
/* Increase the size of the buffer and retry. */
buffer->alloc += len + 32768;
if (buffer->alloc > 0xa00000)
fatal("buffer_append_space: alloc %u not supported",
buffer->alloc);
buffer->buf = xrealloc(buffer->buf, buffer->alloc);
goto restart;
/* NOTREACHED */
}
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.3

wkYEARECAAYFAj9mSqAACgkQO4YmZKj9rSu4mQCeMS8jvadKaKO01kAwl3Ykwirr9ZEA
oLOwzsupmVKP+z1R/5OSlu8NHngf
=c0bi
-----END PGP SIGNATURE-----

and

http://www.freebsd.org/cgi/cvsweb.cgi/src/crypto/openssh/buffer.c.diff?r1=1.1.1.6&r2=1.1.1.7&f=h 
and

ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/

File:openssh-3.7p1-vs-openbsd.diff.gz 360 KB 16.09.2003 05:00:00
File:openssh-3.7p1.tar.gz 773 KB 16.09.2003 05:00:00 
File:openssh-3.7p1.tar.gz.sig 1 KB 16.09.2003 05:00:00

Someone do anything ? Like a new ebuild

--
Time    : 19:20:17-16:09:2003
NP      : 18 Linkin Park - Kyur4 The Ich-chairman Hahn
SysStat : 19:20:17 up 14 days, 11:01, 2 users, load average: 0.44, 0.37,
0.39


--
gentoo-dev@gentoo.org mailing list


^ permalink raw reply	[relevance 99%]

Results 1-1 of 1 | reverse | options above
-- pct% links below jump to the message on this page, permalinks otherwise --
2003-09-16 13:22 99% [gentoo-dev] openssh exploit Mishael A Sibiryakov

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox