openbsd-ports/net/bitchx/patches/patch-source_misc.c
brad 42f9b24893 Fix a buffer overflow in the DNS resolution code. A buffer overflow
within the resolver code makes it possible to overwrite stack
variables by generating a malformed DNS packet. This problem makes
it possible to create a situation where a malicious user may be
able to execute code remotely with the UID and GID of the BitchX
client. It is necessary for an attacker to control their own DNS
to exploit this bug.
2000-12-13 14:37:08 +00:00

23 lines
428 B
C

--- source/misc.c.orig Tue Dec 12 17:05:45 2000
+++ source/misc.c Tue Dec 12 17:07:24 2000
@@ -2641,6 +2641,11 @@
switch(type)
{
case T_A :
+ if (dlen != sizeof(struct in_addr))
+ {
+ cp += dlen;
+ break;
+ }
rptr->re_he.h_length = dlen;
if (ans == 1)
rptr->re_he.h_addrtype=(class == C_IN) ?
@@ -2687,6 +2692,7 @@
*alias = NULL;
break;
default :
+ cp += dlen;
break;
}
}