There seems to be a lot of lines in Jamnntpd's code that looks similar to this. My first search for "strcpy" came up with:
strcpy(addr,&originbuf[d+1]);
Use of strcpy() in general is considered unsafe. But that's not the same issue that apam posted about (overlapping source and destination
string). The example use of strcpy() above may be fine or may not, depending on the size of the 'addr' buffer and the length string at originbuf + d + 1.
| Sysop: | Weed Hopper |
|---|---|
| Location: | Clearwater, FL |
| Users: | 15 |
| Nodes: | 6 (0 / 6) |
| Uptime: | 94:10:16 |
| Calls: | 149 |
| Files: | 50,605 |
| D/L today: |
921 files (811M bytes) |
| Messages: | 342,951 |