Excessive user-supplied input in URLs submitted to the server will cause a buffer overflow, crashing the program, requiring it to be restarted. This vulnerability may be exploitable as a stack overflow, allowing a remote attacker to execute arbitrary commands as the user of the webserver process.
Excessive user-supplied input in URLs submitted to the server will cause a buffer overflow, crashing the program, requiring it to be restarted. This vulnerability may be exploitable as a stack overflow, allowing a remote attacker to execute arbitrary commands as the user of the webserver process.