Limit the risk of `buf' overrun in ping.c when printing hostnames.
Note, this is not really a security risk, because the buffer in question is a static variable in the data segment and not on the stack, and hence cannot subert the flow of execution in any way. About the worst case was that if you pinged a long hostname, ping could coredump. Pointed out on: bugtraq (listserv@netspace.org)
This commit is contained in:
parent
5e197e7c26
commit
ca46dbbc1c
@ -959,9 +959,10 @@ pr_addr(l)
|
||||
|
||||
if ((options & F_NUMERIC) ||
|
||||
!(hp = gethostbyaddr((char *)&l, 4, AF_INET)))
|
||||
(void)sprintf(buf, "%s", inet_ntoa(*(struct in_addr *)&l));
|
||||
(void)snprintf(buf, sizeof(buf), "%s",
|
||||
inet_ntoa(*(struct in_addr *)&l));
|
||||
else
|
||||
(void)sprintf(buf, "%s (%s)", hp->h_name,
|
||||
(void)snprintf(buf, sizeof(buf), "%s (%s)", hp->h_name,
|
||||
inet_ntoa(*(struct in_addr *)&l));
|
||||
return(buf);
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user