svn commit: r349890 - head/contrib/telnet/telnet
Conrad Meyer
cem at freebsd.org
Thu Jul 25 01:57:00 UTC 2019
Hi Philip,
Sorry I'm late to the party. Unless I am mistaken, most of these are
*not* overflows or vulnerabilities of any sort.
On Wed, Jul 10, 2019 at 10:42 AM Philip Paeps <philip at freebsd.org> wrote:
>
> Author: philip
> Date: Wed Jul 10 17:42:04 2019
> New Revision: 349890
> URL: https://svnweb.freebsd.org/changeset/base/349890
>
> Log:
> telnet: fix a couple of snprintf() buffer overflows
>...
> --- head/contrib/telnet/telnet/commands.c Wed Jul 10 17:21:59 2019 (r349889)
> +++ head/contrib/telnet/telnet/commands.c Wed Jul 10 17:42:04 2019 (r349890)
> @@ -1655,10 +1655,11 @@ env_init(void)
> char hbuf[256+1];
> char *cp2 = strchr((char *)ep->value, ':');
>
> - gethostname(hbuf, 256);
> - hbuf[256] = '\0';
> - cp = (char *)malloc(strlen(hbuf) + strlen(cp2) + 1);
> - sprintf((char *)cp, "%s%s", hbuf, cp2);
> + gethostname(hbuf, sizeof(hbuf));
> + hbuf[sizeof(hbuf)-1] = '\0';
> + unsigned int buflen = strlen(hbuf) + strlen(cp2) + 1;
> + cp = (char *)malloc(sizeof(char)*buflen);
> + snprintf((char *)cp, buflen, "%s%s", hbuf, cp2);
This patch makes no functional change, except gethostname()'s 2nd
parameter is now 257 instead of 256. It was not an overflow before
and the formatted malloc contents are identical.
> Modified: head/contrib/telnet/telnet/telnet.c
> ==============================================================================
> --- head/contrib/telnet/telnet/telnet.c Wed Jul 10 17:21:59 2019 (r349889)
> +++ head/contrib/telnet/telnet/telnet.c Wed Jul 10 17:42:04 2019 (r349890)
> @@ -785,7 +785,7 @@ suboption(void)
> name = gettermname();
> len = strlen(name) + 4 + 2;
> if (len < NETROOM()) {
> - sprintf(temp, "%c%c%c%c%s%c%c", IAC, SB, TELOPT_TTYPE,
> + snprintf(temp, sizeof(temp), "%c%c%c%c%s%c%c", IAC, SB, TELOPT_TTYPE,
> TELQUAL_IS, name, IAC, SE);
This one actually overflowed before. But the new behavior isn't much
better. Truncating the formatted string arbitrarily is still wrong;
it would be better to errx() or assert() or abort().
> @@ -807,7 +807,7 @@ suboption(void)
>
> TerminalSpeeds(&ispeed, &ospeed);
>
> - sprintf((char *)temp, "%c%c%c%c%ld,%ld%c%c", IAC, SB, TELOPT_TSPEED,
> + snprintf((char *)temp, sizeof(temp), "%c%c%c%c%ld,%ld%c%c", IAC, SB, TELOPT_TSPEED,
> TELQUAL_IS, ospeed, ispeed, IAC, SE);
> len = strlen((char *)temp+4) + 4; /* temp[3] is 0 ... */
Unless I'm miscounting, this could not overflow (on any FreeBSD system
with 64-bit or smaller long)...
> Modified: head/contrib/telnet/telnet/utilities.c
> ==============================================================================
> --- head/contrib/telnet/telnet/utilities.c Wed Jul 10 17:21:59 2019 (r349889)
> +++ head/contrib/telnet/telnet/utilities.c Wed Jul 10 17:42:04 2019 (r349890)
> @@ -629,7 +629,7 @@ printsub(char direction, unsigned char *pointer, int l
> }
> {
> char tbuf[64];
> - sprintf(tbuf, "%s%s%s%s%s",
> + snprintf(tbuf, sizeof(tbuf), "%s%s%s%s%s",
> pointer[2]&MODE_EDIT ? "|EDIT" : "",
> pointer[2]&MODE_TRAPSIG ? "|TRAPSIG" : "",
> pointer[2]&MODE_SOFT_TAB ? "|SOFT_TAB" : "",
This one could not overflow before either.
I think most of this change is an unnecessary regression, and the
actual overflow should be fixed in a better way anyway.
Thanks,
Conrad
More information about the svn-src-all
mailing list