[569] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: NCSA httpd 1.3 vulnerability still unsolved? (And where to go to solve it?)

daemon@ATHENA.MIT.EDU (Brian Behlendorf)
Mon Apr 3 21:32:15 1995

Date: Mon, 3 Apr 1995 14:06:37 -0800 (PST)
From: Brian Behlendorf <brian@wired.com>
To: Prentiss Riddle <riddle@is.rice.edu>
cc: www-security@ns1.rutgers.edu, lopatic@dbs.informatik.uni-muenchen.de,
        httpd@ncsa.uiuc.edu, timbl@w3.org, cert@cert.org
In-Reply-To: <199504022023.PAA16819@is.rice.edu>
Errors-To: owner-www-security@ns2.rutgers.edu

On Sun, 2 Apr 1995, Prentiss Riddle wrote:
> Has any consensus been reached, or are those of us without the time to
> fully research the problem ourselves just supposed to guess based on
> which of these three sources we feel is most trustworthy?

The problem was that there are *many* places in the 1.3 code where 
strings are allowed to grow without bounds-checking.  The forthcoming 1.4 
fixes a very large number of these (possibly all, but I haven't looked
closely at 1.4's src enough to say "all").  

If that's not good enough for you now, remember that the bug can only 
really be exploited if you're using a binary that the attacker has access 
to; thus, if you have modified your httpd at all and recompiled, or you 
simply set MAX_STRING_LEN to be another number instead of 
HUGE_STRING_LEN, you will probably be safe until 1.4.

	Brian

--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--
brian@hotwired.com  brian@hyperreal.com  http://www.hotwired.com/Staff/brian/


home help back first fref pref prev next nref lref last post