Anibal L. Sacco wrote: > The vulnerabilities are caused due to boundary errors when reading > the player's name in pl_main.c > > code segment: > printf("Your name, Captain? "); > fflush(stdout); > fgets(captain, sizeof captain, stdin); > if (!*captain) > strcpy(captain, "no name"); > else > captain[strlen(captain) - 1] = '\0'; > } > > Being captain initialized as: char captain[80].
sizeof(captain) is 80 so fgets reads in at most 79 characters. The trailing NULL will be added as the 80th character which still seems to be within the array size to me. > There is some similar issues in Tetris, and Hack too. Well feel free to provide the details of those issues. -- see shy jo
signature.asc
Description: Digital signature