[ntp:security] [Bug 690] Buffer overflow in Windows when doing DNS Lookups

bugzilla at ntp.isc.org bugzilla at ntp.isc.org
Fri Aug 18 12:12:00 UTC 2006


Additional Comments From mayer at ntp.org (Danny Mayer)
Submitted on 2006-08-18 12:12

I did these, so you can blame me for this. It had to do with some
special work to get control of return codes from dns lookups. Getting it
right was hard and I overlooked this code. Thanks for finding these.

I'll fix it.
Thw tokens are being passed by reference in order for the API to
return a value in it. It doesn't really care what's in the variable.
Purify can't know that without knowing what goes on in the API and it
has no access to that. It's just warning as a precaution.


Danny Mayer <mayer at ntp.org>

------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.

More information about the security mailing list