Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 19 Mar 2007 23:45:25 +0300
From: Solar Designer <>
Subject: Re: Buffer Overflow warning with -fstack-protector and bigpatch (des3-cbc-sha1)

On Mon, Mar 19, 2007 at 08:36:33PM +0100, Till Maas wrote:
> #5  0x08055c15 in krb5_decrypt_compare () at KRB5_fmt.c:167

Line 167 is the last line of the function, so we don't know what line
actually triggers the check.

Without reviewing that code in full context (I don't care about it
enough to do that), I've only noticed that the strncmp() is wrong - it
should be skipped when there are fewer than strlen(KRBTGT) characters
left from &plain[i] till the end of plain[].  But that might not be
_the_ problem.

Till, Erik - care to try fixing that function to make it work with

> Btw. why are the patches distributed apart from john?

You've identified one of the reasons - the quality is often inadequate.
Other reasons include dependencies on external libraries (in this case
it's libdes or OpenSSL) and licensing issues.

Alexander Peslyak <solar at>
GPG key ID: 5B341F15  fp: B3FB 63F4 D7A3 BCCC 6F6E  FC55 A2FC 027C 5B34 1F15 - bringing security into open computing environments

To unsubscribe, e-mail and reply
to the automated confirmation request that will be sent to you.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.