[3906] in bugtraq

home help back first fref pref prev next nref lref last post

Re: false alarm: query cgi problem

daemon@ATHENA.MIT.EDU (der Mouse)
Fri Jan 10 16:58:40 1997

Date: 	Fri, 10 Jan 1997 12:03:22 -0500
Reply-To: der Mouse <mouse@Holo.Rodents.Montreal.QC.CA>
From: der Mouse <mouse@Holo.Rodents.Montreal.QC.CA>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@netspace.org>

> For anyone who cares, the buffer overflow in the query cgi is not
> exploitable.  This is because the exploit requires 21,000+ bytes, and
> the maximum size for a URL is 1024 bytes.  That is how it is defined
> in the RFC.

That doesn't necessarily mean it's not exploitable; it depends on what
the web server in question does with URLs that violate the RFC.  If the
web server truncates, dumps the request, or something similar, you're
okay - but if it is liberal in what it accepts and is willing to handle
URLs 21K long, you could still be in trouble.

                                        der Mouse

                               mouse@rodents.montreal.qc.ca
                     7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B

home help back first fref pref prev next nref lref last post