You are viewing a plain text version of this content. The canonical link for it is here.
Posted to bugs@httpd.apache.org by bu...@apache.org on 2004/09/07 22:36:19 UTC
DO NOT REPLY [Bug 31107] New: -
0x00 0x1a causes stream corruption with PUT
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=31107>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND
INSERTED IN THE BUG DATABASE.
http://issues.apache.org/bugzilla/show_bug.cgi?id=31107
0x00 0x1a causes stream corruption with PUT
Summary: 0x00 0x1a causes stream corruption with PUT
Product: Apache httpd-2.0
Version: 2.0.50
Platform: PC
URL: http://www.plaza1.net
OS/Version: Windows XP
Status: NEW
Severity: Normal
Priority: Other
Component: Core
AssignedTo: bugs@httpd.apache.org
ReportedBy: apache.org@plaza1.net
Information is sent to the webserver using the PUT method. Whenever the data
PUT contains the following word, 0x00 0x1a , the stream is corrupted. The cgi
program receives repeated 0x1a until the end of transmission.
This problem only occurs in the Win32 (affects Win2k and WinXP) version of
apache and does not occur in the Linux version.
---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org