[Previous] [Next] [Index] [Thread]

Re: CIAC Advisory F-11 Report: Unix NCSA httpd Vulnerability



The problem is none of the patches of adjusting the size of the "tmp"
array in strsubfirst() really fix the overall problem.

If the input array (dest) is sized to HUGE_STRING_LEN and is full,
then the input array (dest) will overrun whatever follows it when the
	strcpy(&dest[strlen(src)],tmp);
is executed because now the total number of bytes placed in dest is
"what was there" plus (in the case most recently discussed) the
contents of document_root_path.

strsubfirst() really needs to now the declared size of the formal
parameter "dest" in order to prevent overruns from occuring in
strsubfirst().

Ric (<ric@rtd.com> "Ric Anderson", using RTD's public internet access)


Follow-Ups: References: