GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Embed Notice

HTML Code

Corresponding Notice

  1. Embed this notice
    Will Dormann (wdormann@infosec.exchange)'s status on Saturday, 12-Apr-2025 01:16:44 JSTWill DormannWill Dormann
    in reply to

    If I look closer at the difference between the vulnerable version and the "remediated" version, it's now clear where the fix is.

    In the vulnerable code, the attacker-provided length of data is strlcopy'd into a 50-byte array. And badness ensues.

    In the "remediated" version, the strlcopy only copies 50 bytes, as the target variable is 50 bytes.

    So I'd consider this an actual fix. But presumably Ivanti didn't realize that a stack buffer overflow could have a security impact? And thus the lack of CVE when it was fixed, or the attempt to also fix their Ivanti Policy Secure and ZTA Gateways products? 🤷♂️

    In conversationabout a month ago from infosec.exchangepermalink

    Attachments



    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/281/726/048/827/339/original/a56f5aaff56a5f0f.png

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/281/726/726/955/956/original/558c2016324e412f.png

    3. No result found on File_thumbnail lookup.
      http://bytes.So/
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.