![]() |
Нашел уязвимости в nginx-1.8.0
Раскрутить что нибудь можно?! Severity: High Issue: umask umask() can easily be used to create files with unsafe priviledges. It should be set to restrictive values.
Issue: getenv Environment variables are highly untrustable input. They may be of any length, and contain any data. Do not make any assumptions regarding content or length. If at all possible avoid using them, and if it is necessary, sanitize them and truncate them to a reasonable length.
Issue: fixed size global buffer Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
Issue: gethostbyname DNS results can easily be forged by an attacker (or arbitrarily set to large values, etc), and should not be trusted.
Issue: read Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
Issue: crypt Standard random number generators should not be used to generate randomness used for security reasons. For security sensitive randomness a crytographic randomness generator that provides sufficient entropy should be used.
Issue: srandom Standard random number generators should not be used to generate randomness used for security reasons. For security sensitive randomness a crytographic randomness generator that provides sufficient entropy should be used.
Issue: X509_NAME_oneline Allow the function to dynamically allocate the buffer. If you insist on a fixed buffer, then double check that your buffer is as big as you specify.
Issue: OPENSSL_free Does the memory need to be cleaned before freeing?
|
что именно вы хотите "раскрутить"? ищите эксплоиты.
|
Цитата:
|
| Время: 15:26 |