[3902] in bugtraq

home help back first fref pref prev next nref lref last post

false alarm: query cgi problem

daemon@ATHENA.MIT.EDU (Apropos of Nothing)
Thu Jan 9 22:32:25 1997

Date: 	Thu, 9 Jan 1997 20:26:38 -0500
Reply-To: Apropos of Nothing <apropos@sover.net>
From: Apropos of Nothing <apropos@sover.net>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@netspace.org>

For anyone who cares, the buffer overflow in the query cgi is not
exploitable.  This is because the exploit requires 21,000+ bytes, and the
maximum size for a URL is 1024 bytes. That is how it is defined in the RFC.


Anyway, consider yourselves lucky since that stops all attacks on query.c
based cgis. (phf, post-query, query, and maybe others have the same buffer
overflow problem).

Of course, it wouldn't hurt to a make getword() et al. do bounds checking.

apropos of nothing

home help back first fref pref prev next nref lref last post