Also if you do patch the source to do the bounds check, do yourself a favor and log any system that trys to exploit this bug. Such information is extremely useful in tracking down penetration attempts on your system from systems that are already penetrated (possibly without the knowledge of the sysadmin). --Chuck McManis Sun Microsystems