Details
-
Bug
-
Status: Closed
-
Critical
-
Resolution: Fixed
-
1.6.0, 1.7.0
-
Any, axis2/c built with native http sender (no libcurl)
Description
With axis2/c used as a client using http transport, if a malicious server begins its reply with more than 512 bytes without CRLF (ie. in place of the response status), this causes a stack overflow in the client. Remote code execution is certainly possible.
Please find a fix for this vulnerability here :
https://github.com/gillesgagniard/wso2-wsf-cpp-gg/commit/976f9c60ccade30ae3fe1a2bddbaeb1fdc9e000a
Attachments
Issue Links
- is related to
-
AXIS2C-1511 infinite loop when consuming a .NET ws with long header string (more than 512 chars in a row).
- Closed
-
AXIS2C-1415 Buffer overrun in axis2_http_client_recieve_header when receiving a HTTP header field larger than 512 bytes in length.
- Closed