Buffer overflow in OpenSSH 2.2.0-3.1.0

Osmo Paananen odie at rotta.media.sonera.net
Sat Apr 20 17:42:28 EST 2002


Hi!

I just saw this on bugtraq. Does someone have more details about this?


Subject: OpenSSH 2.2.0 - 3.1.0 server contains a locally exploitable
    buffer overflow
From: Marcell Fodor <m.fodor at mail.datanet.hu>
Date: 19 Apr 2002 22:42:51 -0000 (Sat 01:42 EEST)
To: bugtraq at securityfocus.com



effect:
	local root

 vulnerable services:

	-pass Kerberos IV TGT
	-pass AFS Token 

bug details:

	radix.c
	GETSTRING macro in radix_to_creds 
function may cause buffer overflow.
	affected buffers:
	
	    creds->service
	    creds->instance
	    creds->realm
	    creds->pinst

exploit code here: mantra.freeweb.hu






More information about the openssh-unix-dev mailing list