21 lines
No EOL
791 B
Text
21 lines
No EOL
791 B
Text
source: https://www.securityfocus.com/bid/568/info
|
|
|
|
|
|
A 'GET' request for a URL longer than 166 characters will overflow a buffer and cause the web server to crash with the following or similar error message:
|
|
|
|
VHTTPD32 caused an invalid page fault in
|
|
module VHTTPD32.EXE at 0137:0040aaed.
|
|
Registers:
|
|
EAX=010d7740 CS=0137 EIP=0040aaed EFLGS=00010202
|
|
EBX=00000000 SS=013f ESP=010d53d0 EBP=010d0074
|
|
ECX=010d7740 DS=013f ESI=010d7740 FS=13c7
|
|
EDX=000000a8 ES=013f EDI=bff92ac1 GS=0000
|
|
Bytes at CS:EIP:
|
|
ff 75 10 56 68 94 01 00 00 eb 1c 68 00 24 40 00
|
|
Stack dump:
|
|
00000010 010d7740 00000000 00000000 00000000
|
|
00000000 00000000 00000000 00000000 00000000
|
|
00000000 00000000 00000000 00000000 00000000
|
|
00000000
|
|
|
|
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19445.zip |