You are viewing a plain text version of this content. The canonical link for it is here.
Posted to apache-bugdb@apache.org by Brian Smith <op...@hotmail.com> on 1999/02/03 18:22:54 UTC

mod_access/3821: check_dir_access(), reads a->order[31] (M_INVALID) where order is defined as 15 ints.

>Number:         3821
>Category:       mod_access
>Synopsis:       check_dir_access(), reads a->order[31]  (M_INVALID)  where order is defined as 15 ints.
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    apache
>State:          open
>Class:          sw-bug
>Submitter-Id:   apache
>Arrival-Date:   Wed Feb  3 09:30:01 PST 1999
>Last-Modified:
>Originator:     opensource_99@hotmail.com
>Organization:
apache
>Release:        1.3.4 (win32)
>Environment:
apache 1.3.4 win32 download - working in MS VisualC++/Devstudio
>Description:
This hasn't caused me any problems, but I just noticed something I think looks
fishy.

order array is defined to be METHODS long (15), yet when we come into 
check_dir_access for an M_INVALID (31) request, we're reading memory we're 
not supposed to.

This problem might give access voilation errors if not for our memory pools, 
and such. 
I doubt it's a security problem, but access permissions seem to be "random"
for M_INVALID.
>How-To-Repeat:
it's in the code.
>Fix:
check for M_INVALID in check_dir_access.
>Audit-Trail:
>Unformatted:
[In order for any reply to be added to the PR database, ]
[you need to include <ap...@Apache.Org> in the Cc line ]
[and leave the subject line UNCHANGED.  This is not done]
[automatically because of the potential for mail loops. ]
[If you do not include this Cc, your reply may be ig-   ]
[nored unless you are responding to an explicit request ]
[from a developer.                                      ]
[Reply only with text; DO NOT SEND ATTACHMENTS!         ]