[17292] in bugtraq

home help back first fref pref prev next nref lref last post

wrong facts about curl exploit

daemon@ATHENA.MIT.EDU (Daniel Stenberg)
Mon Oct 23 12:19:02 2000

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.GSO.4.21.0010221030110.4398-100000@pm1.contactor.se>
Date:         Sun, 22 Oct 2000 10:32:54 +0200
Reply-To: Daniel Stenberg <daniel@HAXX.SE>
From: Daniel Stenberg <daniel@HAXX.SE>
To: BUGTRAQ@SECURITYFOCUS.COM

Hi

I am the main author of curl, the tool that appeared in the Remote Buffer
Overflow Vulnerability reported on October 13th at

	http://www.securityfocus.com/bid/1804

... the information and discussion are accurate, to the point and describes
the problem (even if somewhat unspecific). However, what is bothering me:

	The described exploit is *entirely* wrong!

The described exploit is a) not a remote buffer overflow b) not at all
present in all those versions listed in the advisory. c) hardly an exploit
since it just crashes older versions of the appliction.

There's a "buffer overflow" example posted in the curl bug report system that
would make a far better (and correct) example of how to crash curl using the
posted flaw.

I'd be happy to answer to any questions regarding this matter, and I would
like to see that section of the advisory corrected.

Thanks for an utterly important and useful service!

--
  Daniel Stenberg -- curl project maintainer -- http://curl.haxx.se/

home help back first fref pref prev next nref lref last post