Jump to content
  • Advertisement
Sign in to follow this  
Nice Coder

http request smuggling exploit

This topic is 4879 days old which is more than the 365 day threshold we allow for new replies. Please post a new topic.

If you intended to correct an error in the post then please contact us.

Recommended Posts

Original post by Nice Coder
is nobody interested?

Nice coder

I had written it off, since:

- I [perhaps arbitrarily] don't imagine quite that many devices are susceptable to such attack. The attack requires a device to parse a malformed or borderline http request "incorrectly".

- It, except for perhaps a few exceptional cases, doesn't involve remote exploitation/privledge escalation.

- The cases where the device mis-parses the request are likely easily fixed/patched.

I mean, as a Symantec shareholder, I hope I'm wrong, but... :D

Share this post

Link to post
Share on other sites
Sign in to follow this  

  • Advertisement

Important Information

By using GameDev.net, you agree to our community Guidelines, Terms of Use, and Privacy Policy.

We are the game development community.

Whether you are an indie, hobbyist, AAA developer, or just trying to learn, GameDev.net is the place for you to learn, share, and connect with the games industry. Learn more About Us or sign up!

Sign me up!