Re: Overflow Vulnerability In SAX2Count Demo Program

2005-03-16 Thread Gareth Reakes
Hey, Cheers, patch is in cvs. Gareth [EMAIL PROTECTED] wrote: Here is a patch to fix a buffer overflow in CVS revision 1.29 of samples/SAX2Count/SAX2Count.cpp. The code used strcpy() to place a user-supplied command line option into a 64-byte buffer localeStr. I've replaced this with a strn

Overflow Vulnerability In SAX2Count Demo Program

2005-03-16 Thread Matthew . Hall1
Here is a patch to fix a buffer overflow in CVS revision 1.29 of samples/SAX2Count/SAX2Count.cpp. The code used strcpy() to place a user-supplied command line option into a 64-byte buffer localeStr. I've replaced this with a strncpy call instead. Yes, I know it's trivial, but it could potentially