Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 18 Jul 2014 21:51:22 +0200
From: Salvatore Bonaccorso <>
To: OSS Security Mailinglist <>
Cc: CVE Assignments MITRE <>
Subject: CVE Request: bozohttpd: basic http authentication bypass


Can a CVE be assigned for the following bozohttpd basic http
authetication bypass vulnerability? It was fixed in bozohttpd version
20140708. Quoting NetBSD advisory:

> Abstract
> ========
> When checking for restricted access via .htpasswd files, bozohttpd
> fails to properly check for truncation, allowing specially crafted
> requests to bypass access control without a password.  Files of
> length 10 or more are not affected.
> Technical Details
> =================
> A call to snprintf() was not properly checking for truncation of
> a provided user path, allowing a later concatenation of the
> ".htpasswd" file name to exceed the maximum pathname length.  This
> stops the check for .htpasswd file from working correctly, bypassing
> the basic HTTP authentication scheme.  Files with names longer than
> ".htpasswd" are not visible as they require at least enough for a
> valid path to be available.


Thanks in advance,


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ