By using this site, you agree to our updated Privacy Policy and our Terms of Use. Manage your Cookies Settings.
443,907 Members | 1,932 Online
Bytes IT Community
+ Ask a Question
Need help? Post your question and get tips & solutions from a community of 443,907 IT Pros & Developers. It's quick & easy.

web security question.

P: n/a
I have a friend that was using formmail.pl until last weekend when it
was hacked by spammers with a buffer overflow attack on one of the form
fields. I don't know enough about perl to know how/where the overflow
happened. I do have a raw copy of the data the spammer was using, he was
putting about 40k into a form field to break the script. I am guessing
it broke the script on the regex checking for valid emails or before.
My question is, is python open to such attacks and how to prevent it.
I am working on a web program that will have a email address and will
send an email/s.
would a buffer overflow attack work against python cgi ?

fred

Jul 18 '05 #1
Share this Question
Share on Google+
1 Reply


P: n/a
pxlpluker <px*******@cfl.rr.com> writes:
I have a friend that was using formmail.pl until last weekend when it
was hacked by spammers with a buffer overflow attack on one of the
form fields.


What makes you think it was a buffer overflow bug? formmail.pl is
notorious for having security bugs, but none have been buffer
overflows as far as I know. Are you sure it wasn't some other kind of bug?
Jul 18 '05 #2

This discussion thread is closed

Replies have been disabled for this discussion.