Date: Fri, 26 Jul 2013 11:03:02 -0700 From: John-Mark Gurney <jmg@funkthat.com> To: Mark Felder <feld@freebsd.org> Cc: freebsd-security@freebsd.org Subject: Re: nginx exploit / accept filters Message-ID: <20130726180302.GQ26412@funkthat.com> In-Reply-To: <1374838835.16740.1844463.72B1ED2B@webmail.messagingengine.com> References: <1374838835.16740.1844463.72B1ED2B@webmail.messagingengine.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Mark Felder wrote this message on Fri, Jul 26, 2013 at 06:40 -0500: > As described here: > http://lists.grok.org.uk/pipermail/full-disclosure/2013-July/091084.html > > If I understand this correctly our accept filters will have zero effect > on stopping this exploit, correct? Depending upon where the overflow happens, it could make it even easier to exploit... If the overflow happens in the header part, then the http accept filter will make it even easier, and not require the attacker to do tricks at the TCP layer... -- John-Mark Gurney Voice: +1 415 225 5579 "All that I will do, has been done, All that I have, has not."
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20130726180302.GQ26412>