On Tue, 30 Aug 2005, Jonathan Vanasco wrote:

> are there any worries for security overflows / memory leaks, having compiled
> that stuff into c or xs (its one of those, right?) under mod_perl

Sure, it's worth worrying about.  Anything written in C can
potentially have a buffer-overflow bug or a memory leak, include Perl
itself.

One way to mitigate against a bug like this is to use taint checking.
If you carefully check all input from the user then exploiting a
buffer-overflow becomes much harder, ideally impossible.

> under regular perl, that stuff would just die at the end of the script/post
> execution - under mod_perl does it die after execution and then is respawned
> or is it still running?

You might want to read about buffer-overflow vulnerabilities.  If one
did actually exist and was remotely exploitable then the Apache
process would actually run code written by the attacker.  This isn't
just about crashing the server, it's a break-in scenario.  This goes
for buffer-overflows in XS modules like HTML::Template::JIT as well as
one that might exist in Perl itself.

-sam

Reply via email to