summaryrefslogtreecommitdiff
path: root/usr.sbin/httpd
diff options
context:
space:
mode:
authorHenning Brauer <henning@cvs.openbsd.org>2006-07-28 13:52:31 +0000
committerHenning Brauer <henning@cvs.openbsd.org>2006-07-28 13:52:31 +0000
commita6e45580e5064dbf7052e005cc303682fbac153f (patch)
tree92e53df305a9742c05d51bf3f92a730ccfc3d10a /usr.sbin/httpd
parent242f5dbf436cd952fe9b90df747a7d29f3dc6322 (diff)
A vulnerability has been reported in Apache HTTP Server, which potentially can
be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused by a off-by-one error in mod_rewrite and can be exploited to cause a one-byte buffer overflow. http://secunia.com/advisories/21197/ report "Alexey E. Suslikov" <cruel@texnika.com.ua>, the obvious fix mailed in by Stuart Henderson <stu@spacehopper.org>
Diffstat (limited to 'usr.sbin/httpd')
-rw-r--r--usr.sbin/httpd/src/modules/standard/mod_rewrite.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/usr.sbin/httpd/src/modules/standard/mod_rewrite.c b/usr.sbin/httpd/src/modules/standard/mod_rewrite.c
index a6d90834c4b..a7cdffea2ce 100644
--- a/usr.sbin/httpd/src/modules/standard/mod_rewrite.c
+++ b/usr.sbin/httpd/src/modules/standard/mod_rewrite.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: mod_rewrite.c,v 1.24 2005/02/09 12:13:10 henning Exp $ */
+/* $OpenBSD: mod_rewrite.c,v 1.25 2006/07/28 13:52:30 henning Exp $ */
/* ====================================================================
* The Apache Software License, Version 1.1
@@ -2762,7 +2762,7 @@ static char *escape_absolute_uri(ap_pool *p, char *uri, unsigned scheme)
int c = 0;
token[0] = cp = ap_pstrdup(p, cp);
- while (*cp && c < 5) {
+ while (*cp && c < 4) {
if (*cp == '?') {
token[++c] = cp + 1;
*cp = '\0';