Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 26 Jul 2013 11:03:02 -0700
From:      John-Mark Gurney <jmg@funkthat.com>
To:        Mark Felder <feld@freebsd.org>
Cc:        freebsd-security@freebsd.org
Subject:   Re: nginx exploit / accept filters
Message-ID:  <20130726180302.GQ26412@funkthat.com>
In-Reply-To: <1374838835.16740.1844463.72B1ED2B@webmail.messagingengine.com>
References:  <1374838835.16740.1844463.72B1ED2B@webmail.messagingengine.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Mark Felder wrote this message on Fri, Jul 26, 2013 at 06:40 -0500:
> As described here:
> http://lists.grok.org.uk/pipermail/full-disclosure/2013-July/091084.html
> 
> If I understand this correctly our accept filters will have zero effect
> on stopping this exploit, correct?

Depending upon where the overflow happens, it could make it even easier
to exploit...  If the overflow happens in the header part, then the http
accept filter will make it even easier, and not require the attacker to
do tricks at the TCP layer...

-- 
  John-Mark Gurney				Voice: +1 415 225 5579

     "All that I will do, has been done, All that I have, has not."



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20130726180302.GQ26412>