No.
We have a standard routine we use, safe_snprintf() which replaces the
standard c snprintf() with a version that reports buffer overflows:
char tmpStr[256];
safe_snprintf(__FILE__, __LINE__, tmpStr, sizeof(tmpStr),
"Call Id: %s<br>"
"'%s' called '%s<br>"
"[SSCR=%d][TS=%d]<br>"
"[IniCodecs=%d][Codecs=%s]",
valueOf(record->sip_call_id),
valueOf(record->sip_calling_party),
valueOf(record->sip_called_party),
record->rtp_ssrc, record->rtp_ts,
record->rtp_ini_codecs,
valueOf(record->rtp_codecs));
/* traceEvent(CONST_TRACE_INFO, "DEBUG: ->>>>>>>> '%s'", tmpStr); */
session->session_info = strdup(tmpStr);
If you were running a Unix OS, the message would even tell us how big it
needs to be. That 256 should probably be LEN_GENERAL_WORK_BUFFER.
-----Burton
PS: In the future, use the subject line!
-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Tuesday, July 05, 2005 3:12 PM
To: [email protected]
Subject: [Ntop] (no subject)
Hi!
I'm having some strange problem with NTOP 3.1.5 running on Win2k. As soon as
I enable Netflow plug-in log get full with the following message
- 07/05/05 11:40:55 **ERROR** Buffer too short @
c:\ntop\source\ntop\plugins\netflowplugin.c:698 Could it be caused by using
VMWare ESX to run Win2K?
Andrey Tarasov
_______________________________________________
Ntop mailing list
[email protected]
http://listgateway.unipi.it/mailman/listinfo/ntop
_______________________________________________
Ntop mailing list
[email protected]
http://listgateway.unipi.it/mailman/listinfo/ntop