Bugzilla – Attachment 19854 Details for
Bug 55791
VUL-0: CVE-2004-0488: buffer overflow in mod_ssl
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
IDP Log In
|
Forgot Password
[patch]
patch for apache
mod_ssl-2.8.10-1.3.26-ssl_uuencode-buffersize.dif (text/plain), 959 bytes, created by
Juergen Weigert
on 2004-05-18 23:19:42 UTC
(
hide
)
Description:
patch for apache
Filename:
MIME Type:
Creator:
Juergen Weigert
Created:
2004-05-18 23:19:42 UTC
Size:
959 bytes
patch
obsolete
>--- mod_ssl-2.8.10-1.3.26/pkg.sslmod/ssl_engine_kernel.c.orig 2002-06-23 13:19:21.000000000 +0200 >+++ mod_ssl-2.8.10-1.3.26/pkg.sslmod/ssl_engine_kernel.c 2004-05-18 17:13:13.000000000 +0200 >@@ -1127,7 +1127,7 @@ > { > SSLSrvConfigRec *sc = mySrvConfig(r->server); > SSLDirConfigRec *dc = myDirConfig(r); >- char b1[MAX_STRING_LEN], b2[MAX_STRING_LEN]; >+ char b1[MAX_STRING_LEN], b2[2*MAX_STRING_LEN]; > char *clientdn; > const char *cpAL; > const char *cpUN; >--- mod_ssl-2.8.10-1.3.26/pkg.sslmod/ssl_util.c.orig 2002-02-23 19:45:45.000000000 +0100 >+++ mod_ssl-2.8.10-1.3.26/pkg.sslmod/ssl_util.c 2004-05-18 17:13:51.000000000 +0200 >@@ -168,6 +168,11 @@ > strlen(szFrom), bPad); > } > >+/* >+ * nLength is strlen(szFrom), >+ * sizeof(szTo) must be at least 4*nLength/3 >+ * 18.5.2004, jw@suse.de >+ */ > void ssl_util_uuencode_binary( > unsigned char *szTo, const unsigned char *szFrom, int nLength, BOOL bPad) > {
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
Actions:
View
|
Diff
Attachments on
bug 55791
: 19854 |
19856
|
19913