|   | php.net | support | documentation | report a bug | advanced search | search howto | statistics | random bug | login | 
| 
  [2003-03-12 03:44 UTC] vesely at tana dot it
 Hi,
watch out rfc1867.c around line 342, in function
next_line() there is (was?) the following code:
	if (ptr) {
		/* ... */	
	} else {	
		/* ... */
		line[self->bufsize] = 0;
		self->buf_begin = ptr;    /* <=== */
		self->bytes_in_buffer = 0;
	}
ptr is obviously NULL, buf_begin should never be NULL
or the program may crash. So this is a potential
vulnerability for DOS attackers who submit long lines.
Since you're there, would you mind to check why at line
721, in the rfc1867_post_handler function, there is
		boundary_end = strchr(boundary, ',');
Shouldn't it be ';' (semicolon) rather than ',' (comma)?
(Just wandering)
PatchesPull RequestsHistoryAllCommentsChangesGit/SVN commits             | |||||||||||||||||||||||||||
|  Copyright © 2001-2025 The PHP Group All rights reserved. | Last updated: Fri Oct 31 09:00:01 2025 UTC | 
> buf_begin can be NULL, no DOS possible -> BOGUS1 it is not initialized to NULL, it is never tested for not being NULL, and around line 232, function fill_buffer if (self->bytes_in_buffer > 0 && self->buf_begin != self->buffer) { memmove(self->buffer, self->buf_begin, self->bytes_in_buffer); } should grant the job will be done. Why do you say it can be NULL? If I have some more time next week I'll try and prepare a proof of concept. > searching for ',' is correct this works around a bug > in some IE version -> BOGUS2 Ha ha! I should have guessed it... :-)