On Mon, 21 Jan 2002, Senshu Hiroyuki wrote:

> I use XMail server (ver 0.68-> 1.4).
>
> I have been indebted completely at XMail.
>
> Now, I need to describe the time of having an opportunity reading
> the source code of XMail, and having noticed below.
>
> 1.   Functions, such as sprintf() and strcpy(), are used many.
> 2.   The automatic memory of fixed length is used abundantly.
>
> When the mailed type with it difficult [ to coBy this, mail of a special
> form from the user with malice may cause *buffer overflow*.
>
>
> I wish to exchange in a safe function like snprintf() about the
> portion which cannot specify length.

Please show me a point where a not administrative user can fire a buffer
overflow.
More, even if you can fire a buffer overflow, XMail has a special
protection that makes you unable to guess the stack pointer.



- Davide


-
To unsubscribe from this list: send the line "unsubscribe xmail" in
the body of a message to [EMAIL PROTECTED]
For general help: send the line "help" in the body of a message to
[EMAIL PROTECTED]

Reply via email to