corkscrew -- buffer overflow vulnerability

ID 67A1C3AE-AD69-11DF-9BE6-0015587E2CC1
Type freebsd
Reporter FreeBSD
Modified 2010-08-21T00:00:00


The affected corkscrew versions use sscanf calls without proper bounds checking. In the authentication file parsing routine this can cause an exploitable buffer overflow condition. A similar but issue exists in the server response code but appears to be non-exploitable.