Cool, thank you.
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
hi.
i'm the author of bozohttpd.
this isn't a DoS or security problem. i only noticed this after there
was a secunia notice about one. i've mailed them about this as well
to inform them that their notice is wrong.
in inetd or daemon mode, the double free() occurs in the child process,
not the
Subject: bozohttpd: crashes on invalid input
Package: bozohttpd
Version: 20090522-1
Severity: grave
Justification: user security hole
Tags: security
*** Please type your report below this line ***
bozohttpd crashes with the input 'GET HTTP/1.0\n\n'. (The correct input
would have a '/' after 'GET')
3 matches
Mail list logo