No.

We have a standard routine we use, safe_snprintf() which replaces the
standard c snprintf() with a version that reports buffer overflows:


        char tmpStr[256];

        safe_snprintf(__FILE__, __LINE__, tmpStr, sizeof(tmpStr),
                      "Call Id: %s<br>"
                      "'%s' called '%s<br>"
                      "[SSCR=%d][TS=%d]<br>"
                      "[IniCodecs=%d][Codecs=%s]",
                      valueOf(record->sip_call_id),
                      valueOf(record->sip_calling_party),
valueOf(record->sip_called_party),
                      record->rtp_ssrc, record->rtp_ts,
record->rtp_ini_codecs,
                      valueOf(record->rtp_codecs));

        /* traceEvent(CONST_TRACE_INFO, "DEBUG: ->>>>>>>> '%s'", tmpStr); */
        session->session_info = strdup(tmpStr);

If you were running a Unix OS, the message would even tell us how big it
needs to be.  That 256 should probably be LEN_GENERAL_WORK_BUFFER.

-----Burton

PS: In the future, use the subject line!

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Tuesday, July 05, 2005 3:12 PM
To: [email protected]
Subject: [Ntop] (no subject)

Hi!

I'm having some strange problem with NTOP 3.1.5 running on Win2k. As soon as
I enable Netflow plug-in log get full with the following message
- 07/05/05 11:40:55  **ERROR** Buffer too short @
c:\ntop\source\ntop\plugins\netflowplugin.c:698 Could it be caused by using
VMWare ESX to run Win2K?

Andrey Tarasov

_______________________________________________
Ntop mailing list
[email protected]
http://listgateway.unipi.it/mailman/listinfo/ntop

_______________________________________________
Ntop mailing list
[email protected]
http://listgateway.unipi.it/mailman/listinfo/ntop

Reply via email to