[70903] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: What HTTP exploit?

daemon@ATHENA.MIT.EDU (Paul G)
Mon May 31 11:40:46 2004

From: "Paul G" <paul@rusko.us>
To: "Mike Nice" <niceman@att.net>,
	"Vinny Abello" <vinny@tellurian.com>
Cc: <nanog@merit.edu>
Date: Mon, 31 May 2004 11:36:54 -0400
Errors-To: owner-nanog-outgoing@merit.edu



----- Original Message ----- 
From: "Vinny Abello" <vinny@tellurian.com>
To: "Mike Nice" <niceman@att.net>
Cc: <nanog@merit.edu>
Sent: Monday, May 31, 2004 11:31 AM
Subject: Re: What HTTP exploit?

-- snip --

> I thought if it can be crashed by
> cramming too much info into a buffer before it's truncated, that's
> considered a buffer overflow. I'm no programmer and may be off base here
> but it just struck me as odd also.

it could also be a heap overflow (unless we are talking fbsd, for example).
regardless, i would be very interested in having a look at that gentleman's
apache setup to see if we can crash it reliably <g>

paul


home help back first fref pref prev next nref lref last post