2bc3282372
libc functions which use varargs and printf-style formatting operators. In many situations these can cause security vulnerabilities in the application if it runs with privileges (setugid, or listening to a network socket, etc). An example of the kind of situation pscan looks for is the following: variable = "%s"; /* or malicious user input */ sprintf(buffer, variable); /* BAD! */ WWW: http://www.striker.ottawa.on.ca/~aland/pscan/
5 lines
215 B
Text
5 lines
215 B
Text
$NetBSD: distinfo,v 1.1.1.1 2002/08/06 01:36:59 cjs Exp $
|
|
|
|
SHA1 (pscan.tar.gz) = 7844cabcc1fa014d5d2d192d94565133d60cd51b
|
|
Size (pscan.tar.gz) = 14555 bytes
|
|
SHA1 (patch-aa) = f9b62f12372392bbe65dd97e441037eceb02c622
|