[1002] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Vulnerability in NCSA HTTPD 1.3

daemon@ATHENA.MIT.EDU (Thomas Roessler)
Wed Feb 15 09:40:51 1995

From: Thomas Roessler <roessler@sobolev.cologne.de>
To: ccshag@cclabs.missouri.edu (Paul 'Shag' Walmsley)
Date: Wed, 15 Feb 1995 00:42:03 +0100 (MET)
Cc: lopatic@dbs.informatik.uni-muenchen.de, bugtraq@fc.net,
        roessler@sobolev.cologne.de (Thomas Roessler)
In-Reply-To: <Pine.SGI.3.91.950214002710.12040A-100000@sgi2.phlab.missouri.edu> from "Paul 'Shag' Walmsley" at Feb 14, 95 00:33:05 am

Paul 'Shag' Walmsley wrote:
>  As Thomas implied, this particular problem can probably be fixed by
>  changing line 161 of util.c from
>  
>  	char tmp[MAX_STRING_LEN];
>  to
>  	char tmp[HUGE_STRING_LEN];
>  
>  in NCSA's source.  We're running with the HUGE_STRING_LEN tmp now with no 
>  (immediately apparent) bad side-effects (other than Thomas' hack not working 
>  any more ;)


Sounds reasonable. But what will happen if the destination parameter of
strsubfirst() is too small to hold the result? No checking is done... I
would suggest to additionally increase all the buffer sizes, except the
number of bytes read from the client. I did so at our institute's server,
and it seems to work fine.


-- 
Internet:   roessler@indi5.iam.uni-bonn.de
Private email: roessler@sobolev.cologne.de


home help back first fref pref prev next nref lref last post