Advertisement Jump to content
Sign in to follow this  
Nice Coder

http request smuggling exploit

This topic is 4972 days old which is more than the 365 day threshold we allow for new replies. Please post a new topic.

If you intended to correct an error in the post then please contact us.

Recommended Posts

Advertisement
Quote:
Original post by Nice Coder
is nobody interested?

from,
Nice coder


I had written it off, since:

- I [perhaps arbitrarily] don't imagine quite that many devices are susceptable to such attack. The attack requires a device to parse a malformed or borderline http request "incorrectly".

- It, except for perhaps a few exceptional cases, doesn't involve remote exploitation/privledge escalation.

- The cases where the device mis-parses the request are likely easily fixed/patched.

I mean, as a Symantec shareholder, I hope I'm wrong, but... :D

Share this post


Link to post
Share on other sites
Sign in to follow this  

  • Advertisement
×

Important Information

By using GameDev.net, you agree to our community Guidelines, Terms of Use, and Privacy Policy.

GameDev.net is your game development community. Create an account for your GameDev Portfolio and participate in the largest developer community in the games industry.

Sign me up!