/*
LINE: 475
*/

/* Taxonomy Classification: 0000300601130100051110 */

/*
 *  WRITE/READ               	 0	write
 *  WHICH BOUND              	 0	upper
 *  DATA TYPE                	 0	char
 *  MEMORY LOCATION          	 0	stack
 *  SCOPE                    	 3	inter-file/inter-procedural
 *  CONTAINER                	 0	no
 *  POINTER                  	 0	no
 *  INDEX COMPLEXITY         	 6	N/A
 *  ADDRESS COMPLEXITY       	 0	constant
 *  LENGTH COMPLEXITY        	 1	none
 *  ADDRESS ALIAS            	 1	yes, one level
 *  INDEX ALIAS              	 3	N/A
 *  LOCAL CONTROL FLOW       	 0	none
 *  SECONDARY CONTROL FLOW   	 1	if
 *  LOOP STRUCTURE           	 0	no
 *  LOOP COMPLEXITY          	 0	N/A
 *  ASYNCHRONY               	 0	no
 *  TAINT                    	 5	process environment
 *  RUNTIME ENV. DEPENDENCE  	 1	yes
 *  MAGNITUDE                	 1	1 byte
 *  CONTINUOUS/DISCRETE      	 1	continuous
 *  SIGNEDNESS               	 0	no
 */

/*
NAME: Off-by-one overflow in fb_realpath() CAN-2003-0466
DESCRIPTION: An off-by-one overflow inside the fb_realpath() function
that expands a condensed pathname into a fully qualified pathname. To
exploit this vulnerability, an attacker would first have to create a
deep directory structure.
To cause the overflow, run 'make setup', then run:
obo-bad /tmp/foo/bar/foo/bar/foo/bar/foo/bar/abcdefgh
To fix, change > to >= on line 464.
DIR: models/wu-ftpd/f2
BAD: realpath-bad.c
OK: realpath-ok.c
MAIN: call_fb_realpath.c
*/

