Package: anon-proxy
Version: 00.02.39-7
Severity: serious
Tags: patch, upstream


  The logging code in anon-proxy contains a misuse of the syslog function
 allowing potential remote compromise of the host it is running upon.

  (This depends whether logging is enabled).

  The patch below fixes the issue.

Steve
-- 
# The Debian Security Audit Project.
http://www.debian.org/security/audit

--- CAMsg.cpp-orig      2005-08-29 21:17:42.000000000 +0100
+++ CAMsg.cpp   2005-08-29 21:18:30.000000000 +0100
@@ -124,7 +124,7 @@
                                        {
                                                case MSG_LOG:
                #ifndef _WIN32
-                                                       
syslog(type,oMsg.m_strMsgBuff);
+                                                       
syslog(type,"%s",oMsg.m_strMsgBuff);
                #endif
                                                break;
                                                case MSG_FILE:
[EMAIL PROTECTED]:/tmp/anon-proxy-00.02.39$ 



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to