[AWS] buffer overflow ??

Patrice Freydiere frett27@free.fr
Wed, 7 Apr 2004 22:33:13 +0200


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


hi, 
someone report a buffer overflow for adaimgsvr in the header ->

"
There is a buffer overflow in ADA image server when you send 

a GET request following by 2.112 characters.

A cracker may exploit this vulnerability to make your web 

server crash continually or even execute 

arbirtray code on your system.



Get /[2.112 chars] http/1.0
"


how can we avoid it ?? 

Patrice

- -- 
- ----
gpg --keyserver pgp.mit.edu --recv-key 139A6156
http://adaimgsvr.sourceforge.net
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iQEXAwUBQHRliYppebkTmmFWFALa6gP/ZrC0nxYvxX0pupfsREyfTdA737cvfcnM
tTQmSDTCxB2mvAwpkplznvj41vAv1CBEMea82bPQ3OeDhi1sAG1RLs4aABe/mknx
+D0mnR3UbPnaojpzG+rl+bEuyU6H5RsUr2siBKKYqKMSQrqdZLJ0Dj0Pt4wtu6n/
nsfbgVCTjKcD/3SOa79gyIqulFvPv8dFpfNeD74nqif5IRr4EXBbmCKC/fGSl84w
HhiSYyolQcmAOruoC27MHi9r1Zzc2QcVhlqDkoQ53km29erob4tdJZ76jlp3On7y
sbIHqKoNc3Ms/Fy0owW203WLQPpFb1dwwsMCZO75ikSDnuUR8Ee9C+pz
=H6Xy
-----END PGP SIGNATURE-----