On Mon, 21 Jan 2002, Senshu Hiroyuki wrote: > I use XMail server (ver 0.68-> 1.4). > > I have been indebted completely at XMail. > > Now, I need to describe the time of having an opportunity reading > the source code of XMail, and having noticed below. > > 1. Functions, such as sprintf() and strcpy(), are used many. > 2. The automatic memory of fixed length is used abundantly. > > When the mailed type with it difficult [ to coBy this, mail of a special > form from the user with malice may cause *buffer overflow*. > > > I wish to exchange in a safe function like snprintf() about the > portion which cannot specify length.
Please show me a point where a not administrative user can fire a buffer overflow. More, even if you can fire a buffer overflow, XMail has a special protection that makes you unable to guess the stack pointer. - Davide - To unsubscribe from this list: send the line "unsubscribe xmail" in the body of a message to [EMAIL PROTECTED] For general help: send the line "help" in the body of a message to [EMAIL PROTECTED]
