httpd-bugs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From bugzi...@apache.org
Subject DO NOT REPLY [Bug 31107] New: - 0x00 0x1a causes stream corruption with PUT
Date Tue, 07 Sep 2004 20:36:19 GMT
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=31107>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=31107

0x00 0x1a causes stream corruption with PUT

           Summary: 0x00 0x1a causes stream corruption with PUT
           Product: Apache httpd-2.0
           Version: 2.0.50
          Platform: PC
               URL: http://www.plaza1.net
        OS/Version: Windows XP
            Status: NEW
          Severity: Normal
          Priority: Other
         Component: Core
        AssignedTo: bugs@httpd.apache.org
        ReportedBy: apache.org@plaza1.net


Information is sent to the webserver using the PUT method.  Whenever the data 
PUT contains the following word, 0x00 0x1a , the stream is corrupted.  The cgi 
program receives repeated 0x1a until the end of transmission. 
 
This problem only occurs in the Win32 (affects Win2k and WinXP) version of 
apache and does not occur in the Linux version.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org


Mime
View raw message