httpd-bugs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From bugzi...@apache.org
Subject DO NOT REPLY [Bug 48204] extended patch CVE-2009-3555-2.2.patch handling request splicing in case of server initiated renegotiation
Date Mon, 16 Nov 2009 12:46:12 GMT
https://issues.apache.org/bugzilla/show_bug.cgi?id=48204

--- Comment #3 from Eric Covener <covener@gmail.com> 2009-11-16 04:46:12 UTC ---
(In reply to comment #2)
> (In reply to comment #1)
> > > A simple countermeasure is to reset the buffer 'cbuf' of the decrypted data

> > > in case of a server initiated renegotiation. See the following patch of the
> > > method 'bio_filter_in_read(..) in ssl_engine_io.c
> > 
> > How does this not discard a legitimate clients request line?
> 
> No. If mod_ssl is initiated a SSL renegotiation, the request header is already
> parsed/consumed.

Sorry to be obtuse, but then how does this help in the attack scenario?

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org


Mime
View raw message