TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

From 0-Day to Exploit - Buffer Overflow in Belkin N750 (CVE-2014-1635)

52 pointsby atulagarwalover 10 years ago

3 comments

userbinatorover 10 years ago
<i>±1300 bytes</i><p>I wouldn&#x27;t have thought it possible to generate a negative-sized request...<p>One of my pet peeves is fixed-length buffers in C code, of some size that (thankfully, it&#x27;s checked to prevent going off the end - most of the time, at least...) has no real justification documented anywhere - &quot;why use 72 bytes and not e.g. 80? Why 999, and not 1000 or 1024?&quot; If you&#x27;re going to use C, I think you should be paying more attention to memory allocation and how big things like requests&#x2F;responses can be; otherwise, you should use a &quot;safer&quot; language possibly with dynamic allocation that can handle any size... but on a constrained system like a router that may not be possible (or it&#x27;ll just turn into an opportunity for OOM DoS.)
mihokover 10 years ago
Side bar, who releases these? Is there a feed(s) that devops&#x2F;sysadmin&#x2F;people follow to get the CVE-X-Y reports or is it more ad-hoc&#x2F;whoever finds them
评论 #8587205 未加载
colinbartlettover 10 years ago
It was 11 months from discovery to public disclosure, interesting.