📄 release.txt
字号:
=====================================
GoAhead WebServer 2.1.5 Release Notes
=====================================
.. contents::
GoAhead WebServer 2.1.6 Release Notes
=====================================
Release Date:
25 Mar 2003
``NULL`` pointer crash in ``websSafeUrl()``
-------------------------------------------
Description:
Passing a NULL pointer into the ``websSafeUrl()`` function (as would happen
when the server is processing an invalid URL) crashes the server.
Fix:
Code modified to check for NULL pointer before performing any string
operations.
GoAhead WebServer 2.1.5 Release Notes
=====================================
Release Date:
19 Mar 2003
``bopen()`` failure mode
------------------------
Description:
New failure behavior for ``bopen()`` (see ``balloc.c``)
Fix:
Changed failure behavior of the bopen() function (suggested by Simon
Byholm). If the malloc() request fails, we reset the bopenCount
variable, and thus allow the client code to reattempt the open with
a smaller memory request.
Windows 95/98/ME ``AUX`` Denial of Service
------------------------------------------
Description:
When running on Windows 95/98/ME, URLs requested with path components
matching a set of reserved DOS device names caused the WebServer to crash.
The names that cause the crash are::
aux
con
nul
clock$
config$
Fix:
Code added to the ``websValidateUrl()`` function to check the contents of
the parsed URL against the list of prohibited names. If any of those names
are present in the parsed URL, the URL is rejected as invalid.
The code that checks for these prohibited pathname components checks for
them in the form of either::
http://<<server address>>/aux
or::
http://<<server address>>/aux:
where any non-alphanumeric character following one of the prohibited names
will cause the URL request to be rejected.
404 Cross-site Scripting Exploit
-----------------------------------
Description:
Malicious users could request an invalid URL containing embedded JavaScript
code that would be executed in the user's browser.
Fix:
404 (and other error messages) returned by the WebServer no longer display
the invalid URL.
Long URL Overflow Crash
-----------------------
Description:
URLs containing more than 64 levels of path components caused the WebServer
to crash, entering a buffer overflow condition.
Fix:
The WebServer now keeps track of the depth as it validates the URL. URLs
that are too long are now rejected with an error message.
Incorrect Error Code in ``security.c``
--------------------------------------
Description:
Pages assigned an access level of ``AM_NONE`` should return an error code
of 404 instead of 400 when an attempt it made to access them.
Fix:
Error code corrected.
Pragma Code for RISC Architectures
-------------------------------------
Description:
A pragma was not set correctly when compiling for SPARC machines.
Fix:
Code added to ``uemf.h``::
#ifdef sparc
# define __NO_PACK
#endif /* sparc */
GoAhead
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -