Hi,
@@ -308,7 +310,7 @@
if ( argc 2 )
{
- char buffer[1000];
+ char buffer[MAX_STRING_CHARS];
int i;
strcpy( buffer, Cmd_Argv(1) );
Do I miss something or is this still a buffer overflow?
Cmd_Argv(1) will get the second element from cmd_argv[] which
will
I've prepared a patch that fixes several critical vulnerabilities in
Quake2Forge I have found so far, as well as some other minor bugs. All
security issues described in [1], exept of #5 (Fake Clients DoS), were
fixed, plus some additional ones.
This doesn't mean however that client side is
2 matches
Mail list logo