This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

classification
Title: Python -m Module Vulnerable to Buffer Over Flow.
Type: behavior Stage: resolved
Components: Versions:
process
Status: closed Resolution: not a bug
Dependencies: Superseder:
Assigned To: Nosy List: Dhiraj_Mishra, r.david.murray, skrah
Priority: normal Keywords:

Created on 2016-07-12 19:09 by Dhiraj_Mishra, last changed 2022-04-11 14:58 by admin. This issue is now closed.

Files
File name Uploaded Description Edit
POC-Python.zip Dhiraj_Mishra, 2016-07-12 19:09 POC of above Scenario.
Messages (5)
msg270264 - (view) Author: Dhiraj (Dhiraj_Mishra) * Date: 2016-07-12 19:09
Hello Sir ,

The Module of Python " -m SimpleHTTPServer " is vulnerable to Buffer Over Flow.
Step :
I have prepared a python script which is sending more than 5000+ Values to the Module in GET Method , and as soon as , I run that Script , the Python -m SimpleHTTPServer  which is running on the Victim's system Generator’s a huge Line or Error where as Exception handling is not done Proper , as if the Server do not get crash ,  but if the fuzzing script is run again and again it gets Crashed , and Buffer Over Flow is been Taken place.
In our Scenario Kali Linux machine is victims system running the server module and Linux Mint is sending the fuzzing script.

Please have a look on the POC below.
I ll be happy to hear from the team.
Thank You
msg270267 - (view) Author: R. David Murray (r.david.murray) * (Python committer) Date: 2016-07-12 19:55
Your screenshots don't show any evidence of a crash.  I don't see any buffer overflow here, just normal python error messages.
msg272371 - (view) Author: Dhiraj (Dhiraj_Mishra) * Date: 2016-08-10 20:03
Sorry , for replying to late , But yes if the script is run , again and again the application throws the python error and the Server gets crashed.
I request to have a look on it.
msg272372 - (view) Author: R. David Murray (r.david.murray) * (Python committer) Date: 2016-08-10 20:17
A python traceback is not in and of itself a security issue.

Based on your program name, I am guessing you are trying to "break" python.  That's fine, but if you want us to take action on a bug report like this you are going to have to do more work in characterizing the problem and identifying an actual bug.  It isn't even obvious from what you've supplied that there is a bug (it looks like it could be a networking error).

Also, in the future please post individual files rather than a zip file, since they are much easier to review.

You don't indicate which version of python you are running, so I'm clearing the versions.
msg272440 - (view) Author: Stefan Krah (skrah) * (Python committer) Date: 2016-08-11 12:11
Your "buffer overflow" png shows the regular "414 request-uri too large" traceback.

A traceback is not a crash (I wonder if we need an faq for this).
History
Date User Action Args
2022-04-11 14:58:33adminsetgithub: 71689
2016-08-11 12:11:45skrahsetstatus: open -> closed

nosy: + skrah
messages: + msg272440

resolution: not a bug
stage: resolved
2016-08-10 20:17:16r.david.murraysettype: security -> behavior
messages: + msg272372
versions: - Python 2.7, Python 3.2, Python 3.3, Python 3.4, Python 3.5, Python 3.6
2016-08-10 20:03:59Dhiraj_Mishrasetmessages: + msg272371
2016-07-12 19:55:26r.david.murraysetnosy: + r.david.murray
messages: + msg270267
2016-07-12 19:09:33Dhiraj_Mishracreate