Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: What HTTP exploit?

  • From: Paul G
  • Date: Mon May 31 11:42:34 2004


----- Original Message ----- 
From: "Vinny Abello" <vinny@tellurian.com>
To: "Mike Nice" <niceman@att.net>
Cc: <nanog@merit.edu>
Sent: Monday, May 31, 2004 11:31 AM
Subject: Re: What HTTP exploit?

-- snip --

> I thought if it can be crashed by
> cramming too much info into a buffer before it's truncated, that's
> considered a buffer overflow. I'm no programmer and may be off base here
> but it just struck me as odd also.

it could also be a heap overflow (unless we are talking fbsd, for example).
regardless, i would be very interested in having a look at that gentleman's
apache setup to see if we can crash it reliably <g>

paul





Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.