- **Comment**:

Migrated to [github](https://github.com/bgpsecurity/rpstir/issues/19).



---

** [tickets:#19] possible buffer overrun in scrub_for_print()**

**Status:** closed
**Created:** Wed Jun 10, 2015 01:46 PM UTC by Richard Hansen
**Last Updated:** Fri Jun 12, 2015 02:12 AM UTC
**Owner:** Richard Hansen


If the destination buffer is too small, `scrub_for_print()` may overflow the 
buffer. This is due to assuming that the return value of `snprintf()` is always 
less than the amount of buffer remaining, which isn't necessarily true if a 
character was escaped.


---

Sent from sourceforge.net because rpstir-devel@lists.sourceforge.net is 
subscribed to https://sourceforge.net/p/rpstir/tickets/

To unsubscribe from further messages, a project admin can change settings at 
https://sourceforge.net/p/rpstir/admin/tickets/options.  Or, if this is a 
mailing list, you can unsubscribe from the mailing list.
------------------------------------------------------------------------------
Go from Idea to Many App Stores Faster with Intel(R) XDK
Give your users amazing mobile app experiences with Intel(R) XDK.
Use one codebase in this all-in-one HTML5 development environment.
Design, debug & build mobile apps & 2D/3D high-impact games for multiple OSs.
http://pubads.g.doubleclick.net/gampad/clk?id=254741551&iu=/4140
_______________________________________________
rpstir-devel mailing list
rpstir-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/rpstir-devel

Reply via email to