2bc3282372
libc functions which use varargs and printf-style formatting operators. In many situations these can cause security vulnerabilities in the application if it runs with privileges (setugid, or listening to a network socket, etc). An example of the kind of situation pscan looks for is the following: variable = "%s"; /* or malicious user input */ sprintf(buffer, variable); /* BAD! */ WWW: http://www.striker.ottawa.on.ca/~aland/pscan/
20 lines
469 B
Text
20 lines
469 B
Text
$NetBSD: patch-aa,v 1.1.1.1 2002/08/06 01:36:59 cjs Exp $
|
|
|
|
--- Makefile.orig Sat Sep 2 17:47:37 2000
|
|
+++ Makefile Sat Sep 2 17:48:38 2000
|
|
@@ -13,11 +13,14 @@
|
|
#CC=gcc -Wall -g
|
|
#LEX=flex
|
|
|
|
+CC ?= gcc
|
|
+CFLAGS ?= -O
|
|
+
|
|
pscan: scanner.yy.o pscan.o
|
|
$(CC) scanner.yy.o pscan.o -o pscan
|
|
|
|
scanner.yy.o: scanner.yy.c
|
|
- $(CC) -c scanner.yy.c -o scanner.yy.o
|
|
+ $(CC) $(CFLAGS) -c scanner.yy.c -o scanner.yy.o
|
|
|
|
scanner.yy.c: scanner.l
|
|
$(LEX) -t scanner.l > scanner.yy.c
|