oss-sec mailing list archives

Re: Nginx ngx_http_close_connection function integer overflow - can anyone confirm this?


From: Shawn <citypw () gmail com>
Date: Sun, 28 Apr 2013 13:01:39 +0800

hey Andrew,

I wrote a test program[1] that would generate a bunch of random bytes
as http post payload. I ran it for hours but only make the
r->count==>4. It seems like Nginx community not confirm this issue
yet. I tried to contact 360 guys but didn't get reply.

[1] https://github.com/citypw/arsenal-4-sec-testing/blob/master/http/http_request/http_post_payload_fuzzing.py

On Fri, Apr 26, 2013 at 3:15 PM, Andrew Alexeev <andrew () nginx com> wrote:
On Apr 26, 2013, at 9:48 AM, Alistair Crooks wrote:

On Thu, Apr 25, 2013 at 11:36:17PM -0600, Kurt Seifried wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- From Bugtraq:

http://www.securityfocus.com/archive/1/526439/30/0/threaded

Website: http://safe3.com.cn

Is this legit?

I downloaded the index.html file with curl, and embedded around line 87
was a flash file:

Unfortunately we weren't approached by "Qihoo 360 Web Security Research Team"
before this publication went out through bugtraq.

We are now trying to obtain more information from that team without much success.

We've also analyzed their report and we can't conclude this is a real vulnerability yet.
From the descriptions provided it still looks like it's somewhat spurious.

We are trying to continue investigation though.

Regrettably responsible disclosure isn't always the case. However, we can't yet confirm
it's a full one either.


<table width="930" border="0" align="center" cellpadding="0" cellspacing="0" bgcolor="#FFFFFF">
<tr><td>
<object type="application/x-shockwave-flash" data="/banner.swf?xml=/banner.xml" width="930" height="180">
<param name="movie" value="/banner.swf?xml=/banner.xml"/>
</object>
</td></tr>
<tr>

so I took it to be an attempt at phishing.

Maybe I'm just too paranoid in my old age?

Regards,
Alistair





--
GNU powered it...
GPL protect it...
God blessing it...

regards
Shawn


Current thread: