After seeing a tweet about a command line buffer overflow in nagios plugins I took a look myself. Seems there are probably a bunch of them. http://packetstormsecurity.org/files/108160 uttwer@b0rk:~/test/nagios-plugins-1.4.15/plugins$ grep strcpy *.c |grep -v \" check_dns.c: strcpy(adrp, addresses[i]); check_dns.c: strcpy (query_address, optarg); check_dns.c: strcpy (dns_server, optarg); check_dns.c: strcpy (ptr_server, optarg); check_dns.c: strcpy (query_address, argv[c++]); check_dns.c: strcpy (dns_server, argv[c++]); check_hpjd.c: strcpy (errmsg, input_buffer); check_hpjd.c: strcpy (display_message, temp_buffer + 1); check_http.c: strcpy (newpath + 1, path); check_http.c: strcpy (url, HTTP_URL); check_http.c: strcpy (url, HTTP_URL); check_http.c: strcpy (type, server_type); check_http.c: strcpy (addr, host_name ? host_name : server_address); check_http.c: strcpy (server_type, type); check_nagios.c: strcpy(procprog, temp_string); check_pgsql.c: else /* we know length, and know optarg is terminated, so us strcpy */ check_pgsql.c: strcpy (dbName, optarg); check_procs.c: strcpy(procprog, base_name(procprog)); check_snmp.c: strcpy(&state_string[current_length],temp_string); check_ups.c: strcpy (temp_buffer, recv_buffer); popen.c: strcpy (cmd, cmdstring);