On Thu, 20 Jun 2002, Lupe Christoph wrote:

> On Thursday, 2002-06-20 at 18:22:10 +0400, Igor Sysoev wrote:
> > On Thu, 20 Jun 2002, Lupe Christoph wrote:
> > 
> > > and the mod_perl module seems to prevent the crash:
> > > 
> > > > telnet proxy.customer.de 80
> > > > Trying 213.155.64.138...
> > > > Connected to proxy.customer.de.
> > > > Escape character is '^]'.
> > > > POST /x.html HTTP/1.1
> > > > Host: proxy.customer.de
> > > > Transfer-Encoding: chunked
> > > > 
> > > > 80000000
> > > > Rapid 7
> > > > 0
> > > > 
> > > > 
> > > > ^]
> > > > telnet> Connection closed.
> > > 
> > > Does mod_perl do it's own de-chunking?
> 
> > So mod_perl does not return any response ?
> 
> > There are two ways to prevent crush with particular URI:
> > 1. return 411 error if client send chunked body (standard mod_proxy,
> >    mod_cgi and mod_isapi do it);
> > 2. ignore body at all.
> 
> > I suspect second in your case.
> 
> Sorry that is not the answer to my question - the question is if my
> code gets a chance to do *anything*, or will the httpd code just
> crash at a later time? It does not crash like a non-mod_perl httpd.

I think if you Apache does not send any response then it vulnerable
with this particular URI.

I've tried you request with plain Apache - one process starting to eat
CPU without faults.

Igor Sysoev
http://sysoev.ru

Reply via email to