[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: slurpd -r buffer overflow (ITS#722)



Fixed in HEAD and OPENLDAP_REL_ENG_2.  Please test.  Thanks.

At 11:08 AM 9/10/00 +0000, jhuuskon@messi.uku.fi wrote:
>Full_Name: Jarno Huuskonen
>Version: 2.0.1
>OS: Linux
>URL: ftp://ftp.openldap.org/incoming/
>Submission from: (NULL) (193.167.224.11)
>
>
>slurpd doesn't check -r command line parameter length before using strcpy -->
>buffer overflow
>
>Here's a quick patch:
>--- args.c-orig Sun Sep 10 13:56:09 2000
>+++ args.c      Sun Sep 10 13:58:03 2000
>@@ -106,7 +106,8 @@
>            g->slapd_configfile = strdup( optarg );
>            break;
>        case 'r':       /* slapd replog file */
>-           strcpy( g->slapd_replogfile, optarg );
>+               strncpy( g->slapd_replogfile, optarg, MAXPATHLEN-1);
>+               g->slapd_replogfile[MAXPATHLEN-1] = '\0';
>            rflag++;
>            break;
>        case 't':       /* dir to use for our copies of replogs */