[seanius at debian.org: Re: CVE-2006-2162: Buffer overflow in nagios]

sean finney seanius at seanius.net
Fri May 12 11:48:56 CEST 2006


hey ethan,

On Thu, May 11, 2006 at 02:17:14PM -0500, Ethan Galstad wrote:
> If the packet is greater than INT_MAX in size, then yes, the integer 
> would probably overflow and result in a negative size. The patch to the 
> Nagios CGI handles negative values for the Content-Length, so unless I'm 
> missing something, we should be okay.  Someone please chime in if you 
> believe otherwise.

try setting Content-Length to INT_MAX-1.  because later:

      if(!(cgiinput=(char *)malloc(content_length+1))){


	sean
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL: <https://www.monitoring-lists.org/archive/developers/attachments/20060512/a09521ea/attachment.sig>


More information about the Developers mailing list