> Date: Mon, 1 Jul 2013 12:31:46 +0200
> From: [email protected]
> To: [email protected]; [email protected]
> CC: [email protected]
> Subject: Re: Bug#714612: yardradius:  Multiple Format String Vulnerabilities
> 

> Hi, thanks for your report. While the next issue can be easily exploited,
> the previous one is not evident for me: it depends on the args use
> at every single call. Are you suggesting of checking each call to see
> if it is exploitable?

No, i almost checked all calls , but at the use of functions like 
syslog,vsyslog,snprintf, vfprintf since you have used buffer in log_msg() and 
we don't know its content (maybe %x , %n) and then used by vsnprintf , it is 
highly recommended to use a "format string" to block the way of exploiting by 
an attacker. 

so for ex. instead of :

#if defined(HAVE_SYSLOG)
        syslog(priority, buffer); 

i should use :

#if defined(HAVE_SYSLOG)
        syslog(priority, "%s", buffer); 

also in other function that i mentioned above , use an exact format string is 
recomended.

thanks for your response,

Hamid Zamani

                                          

Reply via email to