Uploaded image for project: 'Axis2-C'
  1. Axis2-C
  2. AXIS2C-1661

vulnerability : buffer overflow in axis2/c http client

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Closed
    • Critical
    • Resolution: Fixed
    • 1.6.0, 1.7.0
    • 1.7.0
    • core/transport
    • Any, axis2/c built with native http sender (no libcurl)

    Description

      With axis2/c used as a client using http transport, if a malicious server begins its reply with more than 512 bytes without CRLF (ie. in place of the response status), this causes a stack overflow in the client. Remote code execution is certainly possible.

      Please find a fix for this vulnerability here :

      https://github.com/gillesgagniard/wso2-wsf-cpp-gg/commit/976f9c60ccade30ae3fe1a2bddbaeb1fdc9e000a

      Attachments

        Issue Links

          Activity

            People

              Unassigned Unassigned
              gillesgagniard Gilles Gagniard
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved:

                Time Tracking

                  Estimated:
                  Original Estimate - 1h
                  1h
                  Remaining:
                  Remaining Estimate - 1h
                  1h
                  Logged:
                  Time Spent - Not Specified
                  Not Specified