Hi Rick,

At 09:58 17/11/00 -0500, Rick Murphy wrote:
>At 01:00 PM 11/16/2000 -0800, [EMAIL PROTECTED] wrote:
>>Has anyone verified this vulnerability??  Hopefully these vulnerability 
>>alert type companies will at least verify the vulnerability before 
>>release it to the public.
>
>It's a vulnerability in one sense but it's unlikely in the extreme that 
>anyone could exploit it. To exploit the vulnerability, you've got to pass 
>a carefully crafted display argument to x-gw. Fortunately, x-gw is usually 
>started up by other proxies (like the telnet proxy); that proxy parses the 
>display argument and won't let you pass that 'carefully crafted' display 
>argument.

  I don't see where the buf parm can be exploited. all pmsg calls are 
either with an "internal" buffer or
with one that was sprintf-ed in. so even passing a display of "%s" hoping 
for a core dump doesn't do.

regards,
mouss

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to