[402] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: CIAC Advisory F-11 Report: Unix NCSA httpd Vulnerability

daemon@ATHENA.MIT.EDU (Brian Behlendorf)
Thu Feb 16 17:07:55 1995

Date: Thu, 16 Feb 1995 09:56:42 -0800 (PST)
From: Brian Behlendorf <brian@wired.com>
To: www-security@ns2.rutgers.edu
In-Reply-To: <9502152131.AA21296@mccarthy.csd.uwo.ca>
Reply-To: www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu

On Wed, 15 Feb 1995, A Warren Pratten wrote:
> ->       /* The default string lengths */
> ->       #define MAX_STRING_LEN 256
> ->       #define HUGE_STRING_LEN 8192
> -> 
> -> to:
> -> 
> ->       /* The default string lengths */
> ->       #define HUGE_STRING_LEN 8192
> ->       #define MAX_STRING_LEN  HUGE_STRING_LEN
> -> 
> -> Then rebuild, install, and restart the new httpd server.
> 
> This is a pathetic fix.  Sure it will solve the problem for a short time until
> a clever hacker realises that all he/she has to do is overflow a larger
> buffer.  

This is also a huge performance hit.  I implemented this yesterday only 
to watch our servers melt due to all the memory swapping taking place 
(16 pages of memory per buffer vs. 1 page before).  

> I think I will opt for patching the source so that is does some sort of bound
> check on the buffer.  At least until NCSA provides an official fix.

There were some other mods posted here recently that provided a much 
nicer fix.

	Brian

--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--
brian@hotwired.com  brian@hyperreal.com  http://www.hotwired.com/Staff/brian/


home help back first fref pref prev next nref lref last post