1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-12-02 01:20:54 +00:00
freebsd-ports/mail/qpopper/files
Mario Sergio Fujikawa Ferreira ab5f0a8e59 Fix following security issue: "If a string of longer than approximately
2048 characters is sent to the qpopper process, a denial of service
condition will occur"

Actually, this is caused by an incorrect assumption. qpopper uses
the same buffer over and over when communicating. However, it never
makes sure that the buffer has been updated if something goes wrong.
Therefore, one can try to add to this buffer over and over; thus,
consuming available resources.

Solution, do not follow unofficial patch available in bugtraq mailing
list since losing pointer references is not an option. Otherwise,
change the way both getline and tgetline functions work. Just so
that they resemble read(2) return codes as follows:

1) if < 0 problem
2) if >= 0 user typed something (enter without anything else is
   something)

First patch sent by Isao SEKI <iseki@gongon.com>

PR:		36326
Prompted by:	Alessandro de Manzano <ale@unixmania.net>,
		Isao SEKI <iseki@gongon.com>
Reviewed by:	eivind,
		Alessandro de Manzano <ale@unixmania.net>,
		David Rufino <dr@soniq.net>,
		Isao SEKI <iseki@gongon.com>
2002-03-31 08:20:28 +00:00
..
extra-patch-password::poppassd.c Conditional extra patches if WITH_POPPASSD is defined. 2001-05-06 03:22:32 +00:00
patch-aa
patch-ac
patch-ao
patch-ap
patch-aq
patch-ar
patch-configure.in o replace patch-configure with patch-configure.in 2001-05-06 03:28:06 +00:00
patch-popper::pop_pass.c qpopper does not properly check for an expired account, fix it with 2001-09-10 00:04:28 +00:00
patch-popper::popper.c Fix following security issue: "If a string of longer than approximately 2002-03-31 08:20:28 +00:00