------- You are receiving this mail because: -------
You are on the CC list for the bug.
http://bugs.exim.org/show_bug.cgi?id=662
Summary: stack corruption in daemon exec code
Product: Exim
Version: 4.69
Platform: Other
OS/Version: All
Status: NEW
Severity: security
Priority: medium
Component: Eximon
AssignedTo: nigel@exim.org
ReportedBy: meissner@suse.de
CC: exim-dev@exim.org
gcc 4.3 spotted this problem:
daemon.c:1696: warning: array subscript is above array bounds
and yes, uschar *extra[4] should have been [5] instead.
patch attached.
I am unsure of the security consequences, but it is possible to corrupt bits of
the stack in this function. Might also depend on the compiler.
Patch attached.
--
Configure bugmail: http://bugs.exim.org/userprefs.cgi?tab=email
--
## List details at http://lists.exim.org/mailman/listinfo/exim-dev Exim details at http://www.exim.org/ ##
You are on the CC list for the bug.
http://bugs.exim.org/show_bug.cgi?id=662
Summary: stack corruption in daemon exec code
Product: Exim
Version: 4.69
Platform: Other
OS/Version: All
Status: NEW
Severity: security
Priority: medium
Component: Eximon
AssignedTo: nigel@exim.org
ReportedBy: meissner@suse.de
CC: exim-dev@exim.org
gcc 4.3 spotted this problem:
daemon.c:1696: warning: array subscript is above array bounds
and yes, uschar *extra[4] should have been [5] instead.
patch attached.
I am unsure of the security consequences, but it is possible to corrupt bits of
the stack in this function. Might also depend on the compiler.
Patch attached.
--
Configure bugmail: http://bugs.exim.org/userprefs.cgi?tab=email
--
## List details at http://lists.exim.org/mailman/listinfo/exim-dev Exim details at http://www.exim.org/ ##