[ https://issues.apache.org/jira/browse/AXIS2C-1661?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Bill Blough resolved AXIS2C-1661. --------------------------------- Resolution: Fixed Fix Version/s: 1.7.0 Fixed in r1848118 > vulnerability : buffer overflow in axis2/c http client > ------------------------------------------------------ > > Key: AXIS2C-1661 > URL: https://issues.apache.org/jira/browse/AXIS2C-1661 > Project: Axis2-C > Issue Type: Bug > Components: core/transport > Affects Versions: 1.6.0, 1.7.0, Current (Nightly) > Environment: Any, axis2/c built with native http sender (no libcurl) > Reporter: Gilles Gagniard > Priority: Critical > Labels: overflow, patch, security > Fix For: 1.7.0 > > Original Estimate: 1h > Remaining Estimate: 1h > > With axis2/c used as a client using http transport, if a malicious server > begins its reply with more than 512 bytes without CRLF (ie. in place of the > response status), this causes a stack overflow in the client. Remote code > execution is certainly possible. > Please find a fix for this vulnerability here : > https://github.com/gillesgagniard/wso2-wsf-cpp-gg/commit/976f9c60ccade30ae3fe1a2bddbaeb1fdc9e000a -- This message was sent by Atlassian JIRA (v7.6.3#76005) --------------------------------------------------------------------- To unsubscribe, e-mail: c-dev-unsubscr...@axis.apache.org For additional commands, e-mail: c-dev-h...@axis.apache.org