[ntp:security] [Bug 690] Buffer overflow in Windows when doing DNS Lookups

bugzilla at ntp.isc.org bugzilla at ntp.isc.org
Thu Aug 24 13:14:09 UTC 2006


http://bugs.ntp.isc.org/690


mayer at ntp.org changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
         AssignedTo|mayer at ntp.org               |stenn at ntp.org
             Status|NEW                         |RESOLVED
         Resolution|                            |READY


----------------------------------------------------------------------------
Additional Comments From mayer at ntp.org (Danny Mayer)
Submitted on 2006-08-24 13:14

This should now be fixed properly. I forced the length field to be the same as
what is being copied into the address list in dnslookup.c and this is now
consistent with what do_nodename() expects.

It's ready for pickup in pogo:ntp-dev.

Danny

-- 
Danny Mayer <mayer at ntp.org>



------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.


More information about the security mailing list