[seanius at debian.org: Re: CVE-2006-2162: Buffer overflow in nagios]

Ethan Galstad nagios at nagios.org
Sat May 13 00:22:44 CEST 2006


Good point.  How does the attached patch look for fixing this?  I may 
have to release the patch standalone for a few days, as the SourceForge 
CVS servers are currently offline (!).

sean finney wrote:
> hey ethan,
> 
> On Thu, May 11, 2006 at 02:17:14PM -0500, Ethan Galstad wrote:
>> If the packet is greater than INT_MAX in size, then yes, the integer 
>> would probably overflow and result in a negative size. The patch to the 
>> Nagios CGI handles negative values for the Content-Length, so unless I'm 
>> missing something, we should be okay.  Someone please chime in if you 
>> believe otherwise.
> 
> try setting Content-Length to INT_MAX-1.  because later:
> 
>       if(!(cgiinput=(char *)malloc(content_length+1))){
> 
> 
> 	sean


Ethan Galstad,
Nagios Developer
---
Email: nagios at nagios.org
Website: http://www.nagios.org
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: getcgi.patch
URL: <https://www.monitoring-lists.org/archive/developers/attachments/20060512/87385dd7/attachment.ksh>


More information about the Developers mailing list