Just to make everyone aware, I've recently found two bugs in FUP that will
cause a server panic. If these are already known, ignore this mail.
 
The first is in bf_fileinfo. It has no error checking whatsoever on the
return value of getpwuid and getgrgid, and thus if one calls fileinfo() on a
file owned by a UID or GID that don't map to a name (ie, get{pwuid,grgid}
returns NULL) it will try to access a structure at NULL, thus causing a
SIGSEGV and subsequently a panic.   
 
The second is due to the lack of any length checking whatsoever in
build_file_name and build_dir_name. If any of the FUP functions are called
with arguments that cause a path name to total more than 2048 bytes (for
example filelist("",<some 2048-byte-long string>)), it will try to tack
together the directory and file names with no length checks, thus leading to
a buffer overflow. I consider this the more dangerous of the two bugs.
 
I'd recommend anyone running a MOO with FUP fix these asap :)

-Sean

-- 
/~\ The ASCII
\ / Ribbon Campaign                   Sean Davis
 X  Against HTML                       aka dive
/ \ Email!

#############################################################
This message is sent to you because you are subscribed to
  the mailing list <[EMAIL PROTECTED]>.
To unsubscribe, E-mail to: <[EMAIL PROTECTED]>
To switch to the DIGEST mode, E-mail to <[EMAIL PROTECTED]>
To switch to the INDEX mode, E-mail to <[EMAIL PROTECTED]>
Send administrative queries to  <[EMAIL PROTECTED]>

Reply via email to