lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4ef5fec60706191454t5e703f27oea368950880df4fc@mail.gmail.com>
Date: Tue, 19 Jun 2007 14:54:28 -0700
From: coderman <coderman@...il.com>
To: "Valdis.Kletnieks@...edu" <Valdis.Kletnieks@...edu>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: IPS Evasion with the Apache HTTP Server

On 6/19/07, Valdis.Kletnieks@...edu <Valdis.Kletnieks@...edu> wrote:
> ...
> I'm tempted to take that bet.  Lot of people have thrown lots of truly wild
> stuff at the Apache code over the years - it may react in *unexpected* ways,
> but it's probably pretty bulletproof.

agreed.


> On the other hand, that little webserver admin tool that's stuffed into one
> corner of your DSL modem's ROM probably got tested ... with little to no
> serious abuse of the interface.

absolutely.  i didn't mean to imply that embedded and lightweight
webservers were more robust, they surely aren't.  only that they would
be much less likely to interpret arbitrary unprintable characters in a
request as valid.

in particular, buffer overflows are not uncommon for embedded devices,
like those who don't expect a request URL to exceed 1024 characters,
etc...

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ