자료출처: http://www.securityfocus.com/archive/1/337662/2003-09-13/2003-09-19/2
The
following advisory is listed on the OpenSSH security page. It was up
some
time ago before disappearing for a while and then reappearing in the
last few
minutes.
---
Subject: OpenSSH Security Advisory:
buffer.adv
This is the 1st revision of the Advisory.
This document
can be found at: http://www.openssh.com/txt/buffer.adv
1.
Versions affected:
All versions of OpenSSH's sshd prior to 3.7
contain a buffer
management error. It is uncertain whether this
error is
potentially exploitable, however, we prefer to see
bugs
fixed proactively.
2. Solution:
Upgrade to
OpenSSH 3.7 or apply the following patch.
Appendix:
Index:
buffer.c
===================================================================
RCS
file: /cvs/src/usr.bin/ssh/buffer.c,v
retrieving revision 1.16
retrieving
revision 1.17
diff -u -r1.16 -r1.17
--- buffer.c 26 Jun 2002
08:54:18 -0000 1.16
+++ buffer.c 16 Sep 2003 03:03:47
-0000 1.17
@@ -69,6 +69,7 @@
void *
buffer_append_space(Buffer
*buffer, u_int len)
{
+ u_int newlen;
void
*p;
if (len > 0x100000)
@@ -98,11 +99,13
@@
goto restart;
}
/* Increase the size
of the buffer and retry. */
- buffer->alloc += len +
32768;
- if (buffer->alloc > 0xa00000)
+
+ newlen =
buffer->alloc + len + 32768;
+ if (newlen >
0xa00000)
fatal("buffer_append_space: alloc %u not
supported",
- buffer->alloc);
- buffer->buf
= xrealloc(buffer->buf,
buffer->alloc);
+ newlen);
+ buffer->buf =
xrealloc(buffer->buf, newlen);
+ buffer->alloc =
newlen;
goto restart;
/* NOTREACHED
*/
}
David Mirza Ahmad
Symantec
PGP: 0x26005712
8D 9A
B1 33 82 3D B3 D0 40 EB AB F0 1E 67 C6 1A 26 00 57 12
--
The battle for
the past is for the future.
We must be the winners of the memory war.
실용적인 디지털 포렌식 기법과 법률 이슈 정리. Linux, UNIX, Python, 임베디드 장치 개발 등의 강좌 수록. Blockchain, FinTech, IoT 등 최신 IT 트렌드와 관련된 취미 자료를 수집하고, 보안 인식 문화 개선을 위한 정보보호 관련 자료와 일상생활 팁들을 소개.
Reentrancy Attack: 블록체인 스마트 컨트랙트의 치명적인 취약점
블록체인 기술이 전 세계적으로 주목받으면서 스마트 컨트랙트(Smart Contract)의 사용이 급격히 증가하고 있습니다. 하지만 그만큼 보안 취약점도 함께 늘어나고 있는데, 그 중에서도 Reentrancy Attack(재진입 공격)은 매우 치명적이고...
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVoSf9jG9Tqh37erdszSR5UGvD95I2vJveHGDirDHYPCrsSxwUohRLDKwhyphenhyphen_LA7nEpIw3DveMT_zmqACnBmnebKTSS9KMRlL3hP3n_C6woK2V_brUXsQtxAOphBXtwyHtqSGIcJV21mGKZhU0KBeH-Rkvth6oJsRhyLtd2oMRV2BCfZ8luCXSTlXY6veK-/w320-h320/Reentrancy%20Attack%20%EB%B8%94%EB%A1%9D%EC%B2%B4%EC%9D%B8%20%EC%8A%A4%EB%A7%88%ED%8A%B8%20%EA%B3%84%EC%95%BD%EC%9D%98%20%EC%B9%98%EB%AA%85%EC%A0%81%20%EC%B7%A8%EC%95%BD%EC%A0%90.webp)
-
뉴스출처 : http://news.naver.com/main/read.nhn?mode=LSD&mid=sec&oid=023&aid=0002991158&sid1=001 내 배우자가 바람을 피우는 것이 확실할까. 심증...
-
PHPSCHOOL ( http://www.phpschool.com ) 국내 1위의 PHP 개발자 커뮤니티 사이트이다. PHP Builder ( http://www.phpbuilder.com ) PHP 최고 사이트라고 해도 과언이 아니며, 새로운 P...