On Friday, 2002-08-30 at 18:33:13 +0000, HalbaSus wrote:

> About that stoopid way of preventing buffer owerflows... Well, tell me a 
> better one. Of course you can patch known bugs. But... how are you gonna 
> prevent new buffer owerflows ?

Auditing?

> What if the guys with 0-day warez are faster 
> than packetstorm and securityfocus ?

Read BUGTRAQ and Full-Disclosure. But as I said, you can't prevent this
from happening. If you could by simply writing a wrapper, how many
protective wrappers would we have now? More than a newly wed couple at
the start of their honeymoon.

> Buffer owerflow under 500 characters ??? 

Sure. There are single-byte overflow exploits in circulation.

> (don't forget that it has to be inserted in a valid input field (User Agent, 
> or something)). And that 500 char. limit was just like a guessing... it's not 
> really something i calculated.

This is no way to approach a security problem.

> If you want to see how does a b0f act start 
> /apache-nojob localhost:69  (and fire up a netcat listening on port 69)
> About the posting stuff.. don't worry about that... my site doesn't need to do 
> posting... so... everybody's happy :)

I'm not arguing about what your site needs (actually I expected so much,
but things change, and *presto* you have your first feedback form ;-),
but what to do about Apache (and mod_perl) security in general. You
know, these discussions find their ways into archives, and somebody else
might find this thread looking for advice.

So I want in no way to prevent you from doing with your webserver
whatever you choose to do (Romania is a free country, too! And I'm glad
about that), just to point out that this gains you little and may in
fact weaken your security.

HTH,
Lupe Christoph
-- 
| [EMAIL PROTECTED]       |           http://www.lupe-christoph.de/ |
| Big Misunderstandings #6398: The Titanic was not supposed to be        |
| unsinkable. The designer had a speech impediment. He said: "I have     |
| thith great unthinkable conthept ..."                                  |

Reply via email to