Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 21 Jun 2002 20:57:29 +0200
From:      Alain Thivillon <at@rominet.net>
To:        freebsd-security@FreeBSD.ORG
Subject:   Re: Apache root exploitable?
Message-ID:  <20020621185729.GG9492@roadrunner.rominet.net>
In-Reply-To: <Pine.BSF.4.20.0206201327200.38173-100000@alive.znep.com>
References:  <20020620201509.GC56227@madman.nectar.cc> <Pine.BSF.4.20.0206201327200.38173-100000@alive.znep.com>

next in thread | previous in thread | raw e-mail | index | archive | help
 
> It isn't a very serious DoS though.

My first try on FreeBSD 4.x with chunk size = 80000000 put httpd child
in an endless loop. 
10 or 20 requests will probably result in an unusable system (loop
continues after client connection is closed).

-- 
Nom d'un chat de nom d'un chat !


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020621185729.GG9492>